Anomalous Taint Detection
نویسندگان
چکیده
Software security has become an increasing necessity for guaranteeing, as much as possible, the correctness of computer systems. A number of techniques have been developed over the past two decades to mitigate software vulnerabilities. Learning-based anomaly detection techniques have been pursued for many years due to their ability to detect a broad range of attacks, including novel attacks. More recently, taint-tracking techniques (also known as information-flow techniques) have become popular due to their high accuracy and the ability to detect a broad range of attacks. We believe that the discriminating power of anomaly detectors can be improved by combining them with fine-grained taint analysis. To this end, we propose anomalous taint detection, an approach which couples taint analysis and learning-based anomaly detection approaches to automatically infer taint-enhanced security policies, while keeping false positives low and increasing the accuracy of the underlying models. The intuitive justification for this is that an attack involves a combination of a vulnerability, and an attackers ability to exercise this vulnerability. Anomaly detection techniques detect behavioral deviations that occur when a vulnerability (targeted by an attack) is exercised. Fine-grained taint information provides clues about the ability of the attacker to exercise this vulnerability. We developed a prototype implementation of our approach which showed that is effective to provide protection from data attacks as well as memory errors which corrupt code pointers. False positives rate are discussed as well.
منابع مشابه
Anomalous Taint Detection ( Extended Abstract ) ⋆
We propose anomalous taint detection, an approach that combines fine-grained taint tracking with learning-based anomaly detection. Anomaly detection is used to identify behavioral deviations that manifest when vulnerabilities are exercised. Fine-grained taint-tracking is used to target the anomaly detector on those aspects of program behavior that can be controlled by an attacker. Our prelimina...
متن کاملWhole-system Fine-grained Taint Analysis for Automatic Malware Detection and Analysis
As malware is becoming increasingly sophisticated and stealthy, effective techniques for malware detection and analysis are imperative. Previous detection mechanisms are insufficient. Signature-based detection cannot detect new malware, and watch-point based behavioral detection can be evaded by stealthier design. Most previous analysis mechanisms are too coarse-grained to capture malware behav...
متن کاملInvestigation of taint analysis for Smartphone-implicit taint detection and privacy leakage detection
Today’s Smartphone operating systems frequently fail to provide users with adequate control and visibility into how the third-party applications use their private data. With TaintDroid realized on Android system, we can detect user’s implicit taint and privacy leakage. But TaintDroid has some inherent defects. To better detect user’s implicit taint and privacy leakage in the Android platform, t...
متن کاملOn the Deployment of Dynamic Taint Analysis for Application Communities
Although software-attack detection via dynamic taint analysis (DTA) supports high coverage of program execution, it prohibitively degrades the performance of the monitored program. This letter explores the possibility of collaborative dynamic taint analysis among members of an application community (AC): instead of full monitoring for every request at every instance of the AC, each member uses ...
متن کاملTaint-Enhanced Anomaly Detection
Anomaly detection has been popular for a long time due to its ability to detect novel attacks. However, its practical deployment has been limited due to false positives. Taint-based techniques, on the other hand, can avoid false positives for many common exploits (e.g., code or script injection), but their applicability to a broader range of attacks (non-control data attacks, path traversals, r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008