Rope: Covert Multi-process Malware Execution with Return-Oriented Programming
نویسندگان
چکیده
Distributed execution designs challenge behavioral analyses of anti-malware solutions by spreading seemingly benign chunks a malicious payload to multiple processes. Researchers have explored methods chop payloads, spread victim applications through process injection techniques, and orchestrate the execution. However, these can hardly be practical as they exhibit conspicuous features make use primitives that operating system mitigations readily detect. In this paper we reason on fundamental requirements properties for stealth implementation distributed malware. We propose new covert design, Rope, minimizes its footprint making commodity techniques like transacted files return-oriented programming communication distribution. report how synthetic Rope samples eluded number state-of-the-art anti-virus endpoint security solutions, bypassed opt-in Windows 10 hardening applications. then discuss directions remediations mitigate such threats.
منابع مشابه
Defending against Return-Oriented Programming
Defending against Return-Oriented Programming
متن کاملEscape From Return-Oriented Programming: Return-oriented Programming without Returns (on the x86)
We show that on the x86 it is possible to mount a return-oriented programming attack without using any return instructions. Our new attack instead makes use of certain instruction sequences that behave like a return; we show that these sequences occur with sufficient frequency in large Linux libraries to allow creation of a Turing-complete gadget set. Because it does not make use of return inst...
متن کاملROPE: Role Oriented Programming Environment for Multiagent Systems
This paper introduces a programming environment and architecture for the development of agent based cooperative applications using a role based approach. We focus on the cooperative aspects by introducing cooperation processes (CP) as a concept of its own. CPs describe all and only the coordination and cooperation parts of an application. The explicit documentation of the coordination and coope...
متن کاملReturn-Oriented Programming without Returns on ARM
In this paper we present a novel and general memory-related attack method on ARM-based computing platforms. Our attack deploys the principles of return-oriented programming (ROP), however, in contrast to conventional ROP, it exploits jumps instead of returns, and hence it can not be detected by return address checkers. Although a similar attack has been recently proposed for Intel x86, it was u...
متن کاملSecurity Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization) created a significantly more difficult environment for vulnerability exploitation. Attackers, however, have recently developed new exploitation methods which are capable of bypassing the operating system’s secur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-88418-5_10