Self debugging mode for patch-independent nullification of unknown remote process infection

  • Authors:
  • Ruo Ando;Yoshiyasu Takefuji

  • Affiliations:
  • Graduate School of Media and Governance, Keio University, Fujisawa, Japan;Graduate School of Media and Governance, Keio University, Fujisawa, Japan

  • Venue:
  • CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

The rapid increase of software vulnerabilities shows us the limitation of patch-dependent countermeasures for malicious code. We propose a patch-independent protection technique of remote infection which enables each process to identify itself with ”being infected” and nullify itself spontaneously. Our system is operating system independent and therefore does not need software rebuilding. Previously, no method for stopping malicious process without recompiling source code or rebuilding software has been proposed. In proposal system, target process is running under self debugging mode which is activated by enhancing debug() exception handler and utilizing MSR debug register. In this paper we show the effectiveness of proposal method by protecting the remote process infection without patching security holes. Implemention of device driver call back function and BranchIP recorder provides the real-time prevention of unregistered worm attack through Internet. In experiment, function test of stack buffer overflow of Win32.SQLExp.Worm is presented. Also CPU utilization corresponding to the number of calling function and some database operations is showed.