Application-level reconnaissance: timing channel attacks against antivirus software

  • Authors:
  • Mohammed I. Al-Saleh;Jedidiah R. Crandall

  • Affiliations:
  • University of New Mexico, Department of Computer Science, Albuquerque, NM;University of New Mexico, Department of Computer Science, Albuquerque, NM

  • Venue:
  • LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Remote attackers use network reconnaissance techniques, such as port scanning, to gain information about a victim machine and then use this information to launch an attack. Current network reconnaissance techniques, that are typically below the application layer, are limited in the sense that they can only give basic information, such as what services a victim is running. Furthermore, modern remote exploits typically come from a server and attack a client that has connected to it, rather than the attacker connecting directly to the victim. In this paper, we raise this question and answer it: Can the attacker go beyond the traditional techniques of network reconnaissance and gain high-level, detailed information? We investigate remote timing channel attacks against ClamAV antivirus and show that it is possible, with high accuracy, for the remote attacker to check how up-to-date the victim's antivirus signature database is. Because the strings the attacker uses to do this are benign (i.e., they do not trigger the antivirus) and the attack can be accomplished through many different APIs, the attacker has a large amount of flexibility in hiding the attack.