Exploit hijacking: side effects of smart defenses

  • Authors:
  • Costin Raiciu;Mark Handley;David S. Rosenblum

  • Affiliations:
  • University College London;University College London;University College London

  • Venue:
  • Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent advances in the defense of networked computers use instrumented binaries to track tainted data and can detect attempted break-ins automatically. These techniques identify how the transfer of execution to the attacker takes place, allowing the automatic generation of defenses. However, as with many technologies, these same techniques can also be used by the attackers: the information provided by detectors is accurate enough to allow an attacker to create a new worm using the same vulnerability, hijacking the exploit. Hijacking changes the threat landscape by pushing attacks to extremes (targeting selectively or creating a rapidly spreading worm), and increasing the requirements for automatic worm containment mechanisms. In this paper, we show that hijacking is feasible for two categories of attackers: those running detectors and those using Self-Certifying Alerts, a novel mechanism proposed by Costa et al. for end-to-end worm containment. We provide a discussion of the effects of hijacking on the threat landscape and list a series of possible countermeasures.