Sophisticated Approaches to Penetrate Highly Secured Systems Claes - - PowerPoint PPT Presentation

sophisticated approaches to penetrate highly secured
SMART_READER_LITE
LIVE PREVIEW

Sophisticated Approaches to Penetrate Highly Secured Systems Claes - - PowerPoint PPT Presentation

Chair of Network Architectures and Services Department of Informatics Technical University of Munich Sophisticated Approaches to Penetrate Highly Secured Systems Claes Adam Wendelin April 20, 2017 Chair of Network Architectures and Services


slide-1
SLIDE 1

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Sophisticated Approaches to Penetrate Highly Secured Systems

Claes Adam Wendelin

April 20, 2017 Chair of Network Architectures and Services Department of Informatics Technical University of Munich

slide-2
SLIDE 2

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Contents

Background System penetration Quantum insert Malware detection Static analysis Dynamic analysis Heuristic analysis Kernel integrity protection Bibliography

  • A. Wendelin

– Malware Detection 2

slide-3
SLIDE 3

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Incentives

  • Economic
  • £27 billion
  • $1.7-$4.2 million
  • Information
  • A. Wendelin

– Malware Detection 3

slide-4
SLIDE 4

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Advanced Persistent Threats

Figure 1: APT attack pyramid [2]

  • A. Wendelin

– Malware Detection 4

slide-5
SLIDE 5

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

System penetration

  • Quantum Insert
  • How does it work?
  • What is required?
  • Detection?

Figure 2: Quantum insert [3]

  • A. Wendelin

– Malware Detection 5

slide-6
SLIDE 6

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Techniques to detect malware

  • Static analysis
  • Dynamic analysis
  • Heuristic analysis
  • Kernel integrity protection
  • A. Wendelin

– Malware Detection 6

slide-7
SLIDE 7

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Static analysis

  • Analyze binary to determine intent
  • Syntactic signature detection
  • Semantic signature detection
  • Pack to hinder analysis
  • A. Wendelin

– Malware Detection 7

slide-8
SLIDE 8

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Static analysis using syntactic signature detection

  • What does the malware look like
  • Hash functions and databases
  • Weak against code obfuscation
  • Randomizing order of 10 independent submodules leads to 10!=3628800

permutations

  • Polymorphic and metamorphic malware

Figure 3: Instruction reordering [1]

  • A. Wendelin

– Malware Detection 8

slide-9
SLIDE 9

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Dynamic analysis

  • Execute malware to observe it
  • Emulated or real-time
  • Syntactic signature detection
  • Polymorphic malware
  • Semantic signature detection
  • A. Wendelin

– Malware Detection 9

slide-10
SLIDE 10

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Dynamic analysis with semantic signature detection

  • How does the malware behave
  • System calls
  • Behavior graphs
  • Robust against code obfuscations
  • Behavior is hard to randomize
  • Generalization of signatures

Figure 4: Behavior graph [5]

  • A. Wendelin

– Malware Detection 10

slide-11
SLIDE 11

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Heuristic analysis

  • Machinelearning and data mining
  • Automation of malware specifications
  • Feature vector
  • System calls
  • OpCode
  • Robustness?
  • False positive rates
  • A. Wendelin

– Malware Detection 11

slide-12
SLIDE 12

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Kernel integrity protection

  • The kernel rules the computer
  • input-output
  • running processes
  • network
  • Control manipulation
  • Pointer tampering
  • Data manipulation
  • Inconsistent data structures
  • A. Wendelin

– Malware Detection 12

slide-13
SLIDE 13

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Kernel integrity protection with shadow pointers

  • Verify access to function pointers

Figure 5: Shadow pointers [7]

  • A. Wendelin

– Malware Detection 13

slide-14
SLIDE 14

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Kernel integrity protection with signed drivers

  • Digitally sign drivers
  • Assumes that signed code is safe
  • What if signed code is not safe?
  • Windows and VirtualBox
  • Return-oriented rootkits
  • A. Wendelin

– Malware Detection 14

slide-15
SLIDE 15

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Return-oriented rootkits

Figure 6: Return-oriented attacks [4]

  • A. Wendelin

– Malware Detection 15

slide-16
SLIDE 16

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Conclusion

  • Detecting malware is hard
  • A. Wendelin

– Malware Detection 16

slide-17
SLIDE 17

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Conclusion

  • Detecting malware is hard
  • Detecting malware is getting harder
  • A. Wendelin

– Malware Detection 17

slide-18
SLIDE 18

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Conclusion

  • Detecting malware is hard
  • Detecting malware is getting harder
  • Syntactic signature detection is broken
  • A. Wendelin

– Malware Detection 18

slide-19
SLIDE 19

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Conclusion

  • Detecting malware is hard
  • Detecting malware is getting harder
  • Syntactic signature detection is broken
  • Heuristics and behavior detection are promising areas
  • A. Wendelin

– Malware Detection 19

slide-20
SLIDE 20

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Conclusion

  • Detecting malware is hard
  • Detecting malware is getting harder
  • Syntactic signature detection is broken
  • Heuristics and behavior detection are promising areas
  • Keeping kernel’s integrity is important
  • A. Wendelin

– Malware Detection 20

slide-21
SLIDE 21

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Questions?

  • Claes Adam Wendelin
  • claesadam.wendelin@in.tum.de
  • A. Wendelin

– Malware Detection 21

slide-22
SLIDE 22

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

[1] E. Al Daoud, I. H. Jebril, and B. Zaqaibeh. Computer virus strategies and detection methods.

  • Int. J. Open Problems Compt. Math, 1(2):12–20, 2008.

[2] P . Giura and W. Wang. Using large scale distributed computing to unveil advanced persistent threats. Science J, 1(3):93–105, 2012. [3] L. Haagsma. Deep dive into quantum insert. Online at https://blog. foxit. com/2015/04/20/deep-dive-into-quantuminsert, 2015. [4] R. Hund, T. Holz, and F. C. Freiling. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In USENIX Security Symposium, pages 383–398, 2009.

  • A. Wendelin

– Malware Detection 22

slide-23
SLIDE 23

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

[5] C. Kolbitsch, P . M. Comparetti, C. Kruegel, E. Kirda, X.-y. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In USENIX security symposium, pages 351–366, 2009. [6] J. Postel and J. Reynolds. File Transfer Protocol (FTP), 1985. https://tools.ietf.org/html/rfc959. [7] Z. Wang, X. Jiang, W. Cui, and X. Wang. Countering persistent kernel rootkits through systematic hook discovery. In International Workshop on Recent Advances in Intrusion Detection, pages 21–

  • 38. Springer, 2008.
  • A. Wendelin

– Malware Detection 23