Skip to main content

Fast and black-box exploit detection and signature generation for commodity software

Publication ,  Journal Article
Wang, X; Li, Z; Choi, JY; Xu, J; Reiter, MK; Kil, C
Published in: ACM Transactions on Information and System Security
December 1, 2008

In biology, a vaccine is a weakened strain of a virus or bacterium that is intentionally injected into the body for the purpose of stimulating antibody production. Inspired by this idea, we propose a packet vaccine mechanism that randomizes address-like strings in packet payloads to carry out fast exploit detection and signature generation. An exploit with a randomized jump address behaves like a vaccine: it will likely cause an exception in a vulnerable programs process when attempting to hijack the control flow, and thereby expose itself. Taking that exploit as a template, our signature generator creates a set of new vaccines to probe the program in an attempt to uncover the necessary conditions for the exploit to happen. A signature is built upon these conditions to shield the underlying vulnerability from further attacks. In this way, packet vaccine detects exploits and generates signatures in a black-box fashion, that is, not relying on the knowledge of a vulnerable programs source and binary code. Therefore, it even works on the commodity software obfuscated for the purpose of copyright protection. In addition, since our approach avoids the expense of tracking the programs execution flow, it performs almost as fast as a normal run of the program and is capable of generating a signature of high quality within seconds or even subseconds. We present the design of the packet vaccine mechanism and an example of its application. We also describe our proof-of-concept implementation and the evaluation of our technique using real exploits. © ACM 2008.

Duke Scholars

Published In

ACM Transactions on Information and System Security

DOI

EISSN

1557-7406

ISSN

1094-9224

Publication Date

December 1, 2008

Volume

12

Issue

2

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 0806 Information Systems
  • 0804 Data Format
  • 0803 Computer Software
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wang, X., Li, Z., Choi, J. Y., Xu, J., Reiter, M. K., & Kil, C. (2008). Fast and black-box exploit detection and signature generation for commodity software. ACM Transactions on Information and System Security, 12(2). https://doi.org/10.1145/1455518.1455523
Wang, X., Z. Li, J. Y. Choi, J. Xu, M. K. Reiter, and C. Kil. “Fast and black-box exploit detection and signature generation for commodity software.” ACM Transactions on Information and System Security 12, no. 2 (December 1, 2008). https://doi.org/10.1145/1455518.1455523.
Wang X, Li Z, Choi JY, Xu J, Reiter MK, Kil C. Fast and black-box exploit detection and signature generation for commodity software. ACM Transactions on Information and System Security. 2008 Dec 1;12(2).
Wang, X., et al. “Fast and black-box exploit detection and signature generation for commodity software.” ACM Transactions on Information and System Security, vol. 12, no. 2, Dec. 2008. Scopus, doi:10.1145/1455518.1455523.
Wang X, Li Z, Choi JY, Xu J, Reiter MK, Kil C. Fast and black-box exploit detection and signature generation for commodity software. ACM Transactions on Information and System Security. 2008 Dec 1;12(2).

Published In

ACM Transactions on Information and System Security

DOI

EISSN

1557-7406

ISSN

1094-9224

Publication Date

December 1, 2008

Volume

12

Issue

2

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 0806 Information Systems
  • 0804 Data Format
  • 0803 Computer Software