taint tracking
play

Taint Tracking Oct 29, 2018 Prof. Raluca Ada Popa Slides adapted - PowerPoint PPT Presentation

CS 261: Systems Security Taint Tracking Oct 29, 2018 Prof. Raluca Ada Popa Slides adapted from Univ of Michigan 583 Fall 12 Announcements Exam next Wednesday Open book All lectures except for this one Presenter: Pasin No writer, but


  1. CS 261: Systems Security Taint Tracking Oct 29, 2018 Prof. Raluca Ada Popa Slides adapted from Univ of Michigan 583 Fall 12

  2. Announcements Exam next Wednesday » Open book » All lectures except for this one Presenter: Pasin No writer, but we will post slides

  3. Taint tracking A commonly used tool in systems security Helps track the flow of data through a program In a nutshell: Data from sensitive sources (e.g., private or potentially malicious sources) is initially tainted Other data influenced by this data gets tainted too

  4. Applications Can be used in a number of ways: Unknown Vulnerability Detection » E.g. Taint Checking in Ruby and Perl » Any data input from an outside user is tainted (e.g., suspicious) » If it is used to set another variable, that gets tainted too » If a tainted variable gets used directly in a SQL query or a system call, flag as problematic Malware Analysis » What is the software doing with sensitive data? » Ex. TaintDroid » Any data from a private source (e.g., text messages) is tainted » Track where it is sent

  5. Dynamic Taint Analysis Track information flow through a program at runtime Set a taint tracking policy: Identify sources of taint – “ TaintSeed ” » What are you tracking? - Untrusted input - Sensitive data Taint Policy – “ TaintTracker ” » Propagation of taint Identify taint sinks – “ TaintAssert ” » Taint checking - Special calls Jump statements - Outside network

  6. Taint Analysis in Action

  7. Example Policy Taint seed example: Any input from an untrusted source is tainted Input t = IsUntrusted( src ) get_input( src )↓ t Taint tracker example: For a binary operation, the taint of the result is the OR of the taints of each operator input t 1 = τ [x 1 ] , t 2 = τ [x 2 ] BinOp x 1 + x 2 ↓ t 1 v t 2 Taint assert: Any goto statement can only go to a nontainted address P goto (t a ) = ¬ t a (Must be true to execute)

  8. Δ tainted untainted Var Val x = get_input( ) x 7 y = x + 42 … Input is tainted goto y τ TaintSeed Var Tainted? Input t = IsUntrusted( src ) T x get_input( src )↓ t All You Ever Wanted to Know About 10/29/2018 Dynamic Taint Analysis 12

  9. Δ tainted untainted Var Val x = get_input( ) x 7 y = x + 42 y 49 … Data derived from user input is tainted goto y τ TaintTracker Var Tainted? t 1 = τ [x 1 ] , t 2 = τ [x 2 ] x T BinOp x 1 + x 2 ↓ t 1 v t 2 T y All You Ever Wanted to Know About 10/29/2018 Dynamic Taint Analysis 13

  10. Δ tainted untainted Var Val x = get_input( ) x 7 y = x + 42 y 49 … Policy Violation goto y Detected τ TaintAssert Var Tainted? x T P goto (t a ) = ¬ t a T y (Must be true to execute) All You Ever Wanted to Know About 10/29/2018 Dynamic Taint Analysis 14

  11. x = get_input( ) y = … … goto y Helpful with buffer overflow: Jumping to … overwritten strcpy(buffer,argv[1]) ; return address … return ; All You Ever Wanted to Know About 10/29/2018 Dynamic Taint Analysis 15

  12. Pay attention to False Negatives » Use control flow to change value without gathering taint Example: if (x == 0) y=0; else if (x == 1) y=1; Equivalent to x=y; » Tainted index into a hardcoded table Policy – value translation is not tainted » Hard to enumerating all sources of taint False Positives » Sanity Checks not removing taint - Requires fine-tuning - Taint sanitization problem - Usually many and a lot of taint!

  13. How about loading from memory?

  14. Memory Load Variables Memory Δ μ Var Val Addr Val x 7 7 42 τ τ μ Var Tainted? Addr Tainted? x T 7 F 10/29/2018 19

  15. Problem: Memory Addresses Var Val Δ x = get_input( ) x 7 y = load( x ) … Addr Val μ goto y 7 42 All values derived from user input are tainted?? Tainted? Addr τ μ 7 F All You Ever Wanted to Know About 10/29/2018 Dynamic Taint Analysis 20

  16. Policy 1: Taint depends only on the memory cell Var Val Δ x = get_input( ) x 7 Jump target could Undertainting y = load( x ) be any untainted memory cell … Failing to identify tainted Addr Val value μ goto y values 7 42 - e.g., missing exploits Taint Propagation Tainted? Addr τ μ Load v = Δ[ x] , t = τ μ [v] 7 F load(x) ↓ t All You Ever Wanted to Know About 10/29/2018 Dynamic Taint Analysis 21

  17. If either the address or the memory Policy 2: cell is tainted, then the value is tainted Memory x = get_input( ) Address Overtainting y = load(jmp_table + x % 2 ) expression is tainted … Unaffected values are tainted jmp_table printa goto y - e.g., flag exploits on safe printb inputs Policy Violation? Taint Propagation Load v = Δ[ x] , t = τ μ [v], t a = τ [x] load(x) ↓ t v t a All You Ever Wanted to Know About 10/29/2018 Dynamic Taint Analysis 22

  18. General Challenge State-of-the-Art is not perfect for all programs Overtainting: Undertainting: Policy may wrongly Policy may miss taint detect taint All You Ever Wanted to Know About 10/29/2018 Dynamic Taint Analysis 23

  19. Summary • Taint tracking can be used to track flow of private data or suspicious inputs • Further reading: All You Ever Wanted to Know About Dynamic Taint Analysis, Schwartz et al, Oakland 2010 • Next up: Pasin on TaintDroid 10/29/2018 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend