Rope: Covert Multi-process Malware Execution with Return-Oriented Programming

نویسندگان

چکیده

Distributed execution designs challenge behavioral analyses of anti-malware solutions by spreading seemingly benign chunks a malicious payload to multiple processes. Researchers have explored methods chop payloads, spread victim applications through process injection techniques, and orchestrate the execution. However, these can hardly be practical as they exhibit conspicuous features make use primitives that operating system mitigations readily detect. In this paper we reason on fundamental requirements properties for stealth implementation distributed malware. We propose new covert design, Rope, minimizes its footprint making commodity techniques like transacted files return-oriented programming communication distribution. report how synthetic Rope samples eluded number state-of-the-art anti-virus endpoint security solutions, bypassed opt-in Windows 10 hardening applications. then discuss directions remediations mitigate such threats.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending against Return-Oriented Programming

Defending against Return-Oriented Programming

متن کامل

Escape From Return-Oriented Programming: Return-oriented Programming without Returns (on the x86)

We show that on the x86 it is possible to mount a return-oriented programming attack without using any return instructions. Our new attack instead makes use of certain instruction sequences that behave like a return; we show that these sequences occur with sufficient frequency in large Linux libraries to allow creation of a Turing-complete gadget set. Because it does not make use of return inst...

متن کامل

ROPE: Role Oriented Programming Environment for Multiagent Systems

This paper introduces a programming environment and architecture for the development of agent based cooperative applications using a role based approach. We focus on the cooperative aspects by introducing cooperation processes (CP) as a concept of its own. CPs describe all and only the coordination and cooperation parts of an application. The explicit documentation of the coordination and coope...

متن کامل

Return-Oriented Programming without Returns on ARM

In this paper we present a novel and general memory-related attack method on ARM-based computing platforms. Our attack deploys the principles of return-oriented programming (ROP), however, in contrast to conventional ROP, it exploits jumps instead of returns, and hence it can not be detected by return address checkers. Although a similar attack has been recently proposed for Intel x86, it was u...

متن کامل

Security Mitigations for Return-Oriented Programming Attacks

With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization) created a significantly more difficult environment for vulnerability exploitation. Attackers, however, have recently developed new exploitation methods which are capable of bypassing the operating system’s secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-88418-5_10