首页|锁闭保护:基于程序行为分析的非预期执行攻击阻断

锁闭保护:基于程序行为分析的非预期执行攻击阻断

扫码查看
投递恶意代码以调用安全敏感服务是网络攻击中实施窃取、损毁、致瘫攻击的必要行为,使网络空间面临严重威胁.本文将此类攻击称为非预期执行攻击,现有的防御技术难以检测以合法载体实施的这类攻击.本文提出了一种称为锁闭保护结构的安全防护机制,作为现有防御技术的补充和安全底线,是阻断恶意行为实施的最后一道防线.通过分析目标程序针对安全敏感服务的预期行为,监控程序实际行为,阻断与预期行为不一致的服务执行,实现对非预期执行攻击的防御.基于对影响服务行为的关键要素的观察,本文提出了锁闭保护模型,作为阻断非预期执行攻击的理论支撑.然后,在Linux实验环境下实现了一个锁闭保护原型系统,使用真实的高级持续性威胁攻击样本、内核权限提升漏洞以及流行的应用程序进行了有效性验证,并评估了其产生的性能开销.实验结果表明,该原型系统能成功抵御典型的非预期执行攻击,仅引入不超过5%的性能开销.
Lockdown-Protection:Unintended Execution Attack Prevention Based on Program Behavior Analysis
Delivering malware to invoke security-sensitive services is a necessary step in cyber-attacks to implement theft,destruction and denial-of-service attacks,putting cyberspace at serious risk.Malware that calls security-sensitive services performs sensitive operations such as file read or write,access control,and system management,posing a direct and significant threat to system security.For instance,in the WannaCry ransomware incident that began in 2017 involved attackers spreading ransomware to victims'devices through vulnerabilities.This ransomware encrypted and overwrote files by invoking the system's file writing services,aiming for ransom.In this paper,we define such attacks as unintended execution attacks,which are difficult to detect by existing techniques.The unintended execution attacks can lead to system crashes,data leakage,or destruction,with serious implications for personal privacy,business operations,and national security.Analyzing the MITRE ATT&CK attack matrix,we conclude that strategies closer to the end of the attack chain are more technically necessary.The invocation of security-sensitive services with high access and execution privileges at the end of the attack chain is a prerequisite for achieving attack objectives,making unintended execution attacks inevitable.Existing defense techniques primarily focus on mitigating and detecting the process of malicious code injection and exploitation,preventing attackers from executing malicious code injection,control flow hijacking,and privilege escalation through code injection or exploiting vulnerabilities in programs.However,with the emergence of new types of vulnerability exploitation techniques,such as code reuse attacks,and considering the performance overhead of mitigation techniques in commercial systems,practical defense solutions are vulnerable to being bypassed.In particular,when attackers enter the system in an unknown manner and run malicious software with privileged accounts,existing defense techniques fail to detect such unintended execution attacks in real time.Therefore,researching countermeasures against unintended execution attacks,serving as the last line of defense to block malicious activities by attackers,is of significant importance for ensuring the baseline security of critical information systems.By a deep understanding of the mechanisms and behavioral characteristics of unintended execution attacks,this paper designs and implements a lockdown protection mechanism,which complement existing defense techniques and act as a security bottom line,which is the last line of defense to intercept malware execution.This mechanism includes three key steps to detect and block unintended execution attacks:(1)expected behavior analysis,(2)actual behavior monitoring,and(3)blocking unexpected behaviors.Specifically,the lockdown protection structure analyzes the expected behaviors of a target program with respect to security-sensitive services at compile time,monitors the actual behaviors of the program at runtime,and verifies that the actual behavior of the program matches the expected behavior prior to service execution.If inconsistencies are detected,the invocation is identified as an unintended execution attack.This defense approach is rooted in the observation that the program's execution behavior during an unintended execution attack deviates from its expected behavior.Based on the observation of critical elements that could affect service behavior,we propose a lockdown-protection model as a theoretical model for defending against unintended execution attacks.We then implement a prototype of lockdown-protection structure on Linux platform.We utilize real-world APT malware,kernel privilege escalation exploits,and popular applications to evaluate the effectiveness of our prototype.We also evaluate the performance overhead of the prototype.Experiment results show that our prototype is effective in defending against typical unintended execution attacks,introducing a performance overhead of less than 5%.

security-sensitive serviceunintended execution attacklockdown-protectionmonitoring program behaviorattack prevention

杨佳庚、方滨兴、冀甜甜、张云涛、王田、崔翔、王媛娣

展开 >

哈尔滨工业大学(深圳)计算机科学与技术学院 广东深圳 518055

北京邮电大学可信分布式计算与服务教育部重点实验室 北京 100876

中关村实验室 北京 100194

积至(海南)信息技术有限公司 北京 100029

展开 >

安全敏感服务 非预期执行攻击 锁闭保护 程序行为监控 攻击阻断

海南省方滨兴院士工作站资金资助

2024

计算机学报
中国计算机学会 中国科学院计算技术研究所

计算机学报

CSTPCD北大核心
影响因子:3.18
ISSN:0254-4164
年,卷(期):2024.47(7)