EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration

نویسندگان

  • Birhanu Eshete
  • Abeer Alhuzali
  • Maliheh Monshizadeh
  • Phillip A. Porras
  • V. N. Venkatakrishnan
  • Vinod Yegneswaran
چکیده

The emergence of exploit kits is one of the most important developments in modern cybercrime. Much of cybersecurity research in the recent years has been devoted towards defending citizens from harm delivered through exploit kits. In this paper, we examine an alternate, counter-offensive strategy towards combating cybercrime launched through exploit kits. Towards this goal, we survey a wide range of 30 real-world exploit kits and analyze a counter-offensive adversarial model against the kits and kit operator. Guided by our analysis, we present a systematic methodology for examining a given kit to determine where vulnerabilities may reside within its serverside implementation. In our experiments, we found over 180 vulnerabilities among 16 exploit kits of those surveyed, and were able to automatically synthesize exploits for infiltrating 6 of them. The results validate our hypothesis that exploit kits largely lack sophistication necessary to resist counter-offensive activities. We then propose the design of EKHUNTER, a system that is capable of automatically detecting the presence of exploit vulnerabilities and deriving laboratory test cases that can compromise both the integrity of a fielded exploit kit, and even the identity of the kit operator. Keywords— exploit kits, web malware, offensive technologies, cybercrime.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Birhanu Eshete

My research interests span the areas of systems security, cyber-crime analysis, big-data security analytics, and machine learning for security. In systems security, I particularly focus on the analysis and detection of advanced and persistent threats, web application security, and web-borne malware defense. In cyber-crime analysis, I focus on malicious sites/URLs, exploit kits, and ransomware. ...

متن کامل

Internet hack back: counter attacks as self-defense or vigilantism?

The poor state of security on the Internet calls for more effective ways to protect networked systems from attacks. One solution is to be able to counter attack with offensive capabilities. With attacker information available, companies find themselves in a dilemma – counter attack for immediate self-defense, retaliate for future deterrence, inform the appropriate law enforcement authorities, o...

متن کامل

Implementing the Five Canonical Offensive Maneuvers in a CGF Environment

In this paper we describe the algorithms and underlying machinery necessary to implement the five canonical offensive maneuvers described in U. S. Army Field Manual FM 3-21, Section II, Forms of Maneuver (envelopment, turning movement, infiltration, penetration, and frontal attack) within a computer generated forces environment. We also include descriptions of algorithms for calculating groups ...

متن کامل

A Graphical Modeling Environment for the Generation of Workflows for the Globus Toolkit

Grid computing aims at managing resources in a heterogeneous distributed environment. The Globus Toolkit provides a set of components that can be used to build applications that function in a grid computing system. Presently, applications are typically handcrafted either by using an Application Programming Interface (API) interacting through a set of command line interfaces, or by using a set o...

متن کامل

Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit

In today’s data-driven world, programmers routinely incorporate user data into complex algorithms, heuristics, and application pipelines. While often beneficial, this practice can have unintended and detrimental consequences, such as the discriminatory effects identified in Staples’ online pricing algorithm and the racially offensive labels recently found in Google’s image tagger. We argue that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015