Skip to main navigation Skip to search Skip to main content

A practical mimicry attack against powerful system-call monitors

  • Chetan Parampalli
  • , R. Sekar
  • , Rob Johnson

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

71 Scopus citations

Abstract

System-call monitoring has become the basis for many host-based intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitoring IDS by executing innocuous-looking sequences of system calls that accomplish the attacker's goals. Mimicry attacks may execute a sequence of dozens of system calls in order to evade detection. Finding such a sequence is difficult, so researchers have focused on tools for automating mimicry attacks and extending them to gray-box IDS1. In this paper, we describe an alternative approach for building mimicry attacks using only skills and technologies that hackers possess today, making this attack a more immediate and realistic threat. These attacks, which we call persistent interposition attacks, are not as powerful as traditional mimicry attacks - - an adversary cannot obtain a root shell using a persistent interposition attack - - but are sufficient to accomplish the goals of today's cyber-criminals. Persistent interposition attacks are stealthier than standard mimicry attacks and are amenable to covert information-harvesting attacks, features that are likely to be attractive to profit-motivated criminals. Persistent interposition attacks are not IDS specific - they can evade a large class of system-call-monitoring intrusion-detection systems, which we call I/O-data-oblivious. I/O-data-oblivious monitors have perfect knowledge of the values of all system call arguments as well as their relationships, with the exception of data buffer arguments to read and write. Many of today's black-box and gray-box IDS are I/O-data-oblivious and hence vulnerable to persistent interposition attacks.

Original languageEnglish
Title of host publicationProceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08
Pages156-167
Number of pages12
DOIs
StatePublished - 2008
Event2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08 - Tokyo, Japan
Duration: Mar 18 2008Mar 20 2008

Publication series

NameProceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08

Conference

Conference2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS '08
Country/TerritoryJapan
CityTokyo
Period03/18/0803/20/08

Keywords

  • Buffer overflow
  • Intrusion-detection
  • Memory error
  • Mimicry attack
  • System-call monitor

Fingerprint

Dive into the research topics of 'A practical mimicry attack against powerful system-call monitors'. Together they form a unique fingerprint.

Cite this