Scargos: Towards automatic vulnerability distribution of zero-day vulnerabilities
نویسنده
چکیده
Information about vulnerabilities spread too slow and allow for a significant attack window during which applications are virtually unprotected. Zero-day attacks jeopardise the security of any IT-system due to the lack of an effective remedy. Recent work has suggested automated approaches to vulnerability distribution, but are limited to memory-corruption detection techniques and disallow custom vulnerability response processes. We present Scargos, a novel approach to automate the distribution and verification of vulnerabilities, while allowing for automatic, custom countermeasures without the need to trust a central authority. By leveraging collaborative detection, vulnerabilities can be contributed by anybody and are announced to an open network by using packet-based self-certifying alerts (SCA), which are a proof of existence of a vulnerability by capturing the original, unmodified attack. We compare two ways to generate and verify an attack: brute-force replay and exact stream replay. After successful verification, SCAs allow for a custom vulnerability response process such as generating automatic malware analysis reports or IDS signatures. We evaluate Scargos with 24 real-world attacks, and show that for all detected attacks, we can generate and verify packet-based SCAs inexpensively and accurately. Scargos performs better for bigger SCA file sizes than previously proposed mechanisms. We show that our approach allows for detection of previously unknown attacks, whereas an entire life cycle including distribution and verification is achieved on average in under 2 seconds. While vulnerability distribution is at present mainly done manually, often reaching end-users after several hours, Scargos reduces the available attack window of adversaries to a minimum.
منابع مشابه
Observation from Microsoft Zero-Day Vulnerability Examples
Zero-Day vulnerabilities are an intriguing and ever increasing problem. Microsoft has been one of the more exploited companies having Zero-Day vulnerabilities. This paper intends to identify some relationships within the ZeroDay vulnerabilities identified in nineteen news articles from 2010. We tried to collect data on vulnerability report date, attack report date, vulnerability patch date, vul...
متن کاملEmpirical Estimates of 0Day Vulnerabilities in Control Systems
We define a 0Day vulnerability to be any vulnerability, in deployed software, which has been discovered by at least one person but has not yet been publicly announced or patched. These 0Day vulnerabilities are of particular interest when assessing the risk to well managed control systems which have already effectively mitigated the publicly known vulnerabilities. In these well managed systems t...
متن کاملVulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning
Rigorous identification of vulnerabilities in program code is a key to implementing and operating secure systems. Unfortunately, only some types of vulnerabilities can be detected automatically. While techniques from software testing can accelerate the search for security flaws, in the general case discovery of vulnerabilities is a tedious process that requires significant expertise and time. I...
متن کاملSting: An End-to-End Self-Healing System for Defending against Internet Worms
We increasingly rely on highly available systems in all areas of society, from the economy, to military, to the government. Unfortunately, much software, including critical applications, contains vulnerabilities unknown at the time of deployment, with memory-overwrite vulnerabilities (such as buffer overflow and format string vulnerabilities) accounting for more than 60% of total vulnerabilitie...
متن کاملN-Version Programming for the Detection of Zero-day Exploits
Using N-Version programming techniques to increase software reliability is a well-explored field. In this paper, we extend the concept to the detection of new security vulnerabilities. Using our own N-Version arbiter, Judicare, we implement a simple auction web application, and demonstrate how our application is robust to the most common Web vulnerabilities as documented by OWASP. Finally, we d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013