Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks

  • Authors:
  • Danilo Bruschi;Lorenzo Cavallaro;Andrea Lanzi

  • Affiliations:
  • Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano, Milano, Italy, Via Comelico 39/41, I-20135, Milano MI, Italy;Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano, Milano, Italy, Via Comelico 39/41, I-20135, Milano MI, Italy;Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano, Milano, Italy, Via Comelico 39/41, I-20135, Milano MI, Italy

  • Venue:
  • DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In 2005, Kruegel et al.proposed a variation of the traditional mimicry attack, to which we will refer to as automatic mimicry, which can defeat existing system call based HIDS models. We show how such an attack can be defeated by using information provided by the Interprocedural Control Flow Graph (ICFG). Roughly speaking, by exploiting the ICFG of a protected binary, we propose a strategy based on the use of static analysis techniques which is able to localize critical regions inside a program, which are segments of code that could be used for exploiting an automatic mimicry attack. Once the critical regions have been recognized, their code is instrumented in such a way that, during the executions of such regions, the integrity of the dangerous code pointers is monitored, and any unauthorized modification will be restored at once with the legal values. Moreover, our experiments shows that such a defensive mechanism presents a low run-time overhead.