TY - GEN
T1 - A practical mimicry attack against powerful system-call monitors
AU - Parampalli, Chetan
AU - Sekar, R.
AU - Johnson, Rob
PY - 2008
Y1 - 2008
N2 - System-call monitoring has become the basis for many host-based intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitoring IDS by executing innocuous-looking sequences of system calls that accomplish the attacker's goals. Mimicry attacks may execute a sequence of dozens of system calls in order to evade detection. Finding such a sequence is difficult, so researchers have focused on tools for automating mimicry attacks and extending them to gray-box IDS1. In this paper, we describe an alternative approach for building mimicry attacks using only skills and technologies that hackers possess today, making this attack a more immediate and realistic threat. These attacks, which we call persistent interposition attacks, are not as powerful as traditional mimicry attacks - - an adversary cannot obtain a root shell using a persistent interposition attack - - but are sufficient to accomplish the goals of today's cyber-criminals. Persistent interposition attacks are stealthier than standard mimicry attacks and are amenable to covert information-harvesting attacks, features that are likely to be attractive to profit-motivated criminals. Persistent interposition attacks are not IDS specific - they can evade a large class of system-call-monitoring intrusion-detection systems, which we call I/O-data-oblivious. I/O-data-oblivious monitors have perfect knowledge of the values of all system call arguments as well as their relationships, with the exception of data buffer arguments to read and write. Many of today's black-box and gray-box IDS are I/O-data-oblivious and hence vulnerable to persistent interposition attacks.
AB - System-call monitoring has become the basis for many host-based intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitoring IDS by executing innocuous-looking sequences of system calls that accomplish the attacker's goals. Mimicry attacks may execute a sequence of dozens of system calls in order to evade detection. Finding such a sequence is difficult, so researchers have focused on tools for automating mimicry attacks and extending them to gray-box IDS1. In this paper, we describe an alternative approach for building mimicry attacks using only skills and technologies that hackers possess today, making this attack a more immediate and realistic threat. These attacks, which we call persistent interposition attacks, are not as powerful as traditional mimicry attacks - - an adversary cannot obtain a root shell using a persistent interposition attack - - but are sufficient to accomplish the goals of today's cyber-criminals. Persistent interposition attacks are stealthier than standard mimicry attacks and are amenable to covert information-harvesting attacks, features that are likely to be attractive to profit-motivated criminals. Persistent interposition attacks are not IDS specific - they can evade a large class of system-call-monitoring intrusion-detection systems, which we call I/O-data-oblivious. I/O-data-oblivious monitors have perfect knowledge of the values of all system call arguments as well as their relationships, with the exception of data buffer arguments to read and write. Many of today's black-box and gray-box IDS are I/O-data-oblivious and hence vulnerable to persistent interposition attacks.
KW - Buffer overflow
KW - Intrusion-detection
KW - Memory error
KW - Mimicry attack
KW - System-call monitor
UR - https://www.scopus.com/pages/publications/60749118885
U2 - 10.1145/1368310.1368334
DO - 10.1145/1368310.1368334
M3 - Conference contribution
SN - 9781595939791
T3 - Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08
SP - 156
EP - 167
BT - Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08
T2 - 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08
Y2 - 18 March 2008 through 20 March 2008
ER -