Statement Yonghwi Kwon
نویسنده
چکیده
I am interested in solving system security problems via program analysis techniques. More specically, I have developed fundamental primitives for the investigation of advanced cyber-aacks and the analysis and prevention of everevolving malicious programs and payloads across multiple platforms. In particular, my research focuses on building systems to solve three prominent problems in system security: 1 aack provenance and root-cause analysis via causality inference [1, 2], 2 reverse-engineering through cross-platform binary analysis [3, 4, 10], and 3 soware exploit prevention via input randomization [5, 7]. My research has introduced novel techniques along with practical systems, advancing the status quo. In recognition of my contributions, I have been honored with four prestigious awards: Best Paper Award, ACM SIGSOFT Distinguished Paper Award, Maurice H. Halstead Memorial Award, and Microso Most Valuable Professional Award. 1 Research Overview and Highlights 1 Attack provenance via causality inference. Recent cyber-aacks are becoming increasingly targeted and sophisticated. A new class of aack called Advanced Persistent reat, or APT, targets a specic organization and compromises systems over a long period of time (e.g., frommonths to years) without being detected. For example, the notorious Stuxnet compromised more than hundreds of thousands of systems through multiple steps. It lurked in the systems for years while silently updating, installing backdoors, and exltrating information. In the end, it even caused physical damages to thousands of machines. It was commented that the aack could have caused a nuclear disaster more catastrophic than Chernobyl. Investigating such an aack is challenging: (1) it occurs over an extended period of time, and hence, the log les for the investigation are prohibitively large (e.g., on the scale of TBs), and (2) the aack process is highly sophisticated involving a large number of processes and les. To address the above challenges, my research proposed causality inference to determine dependencies between system calls (e.g., between input and output system calls) and allow investigators to determine the origin of an aack (e.g., receiving a spam email) and assess the consequences of the aack. I have designed a practical causality inference engine LDX [1] that is 4 times more accurate and 2 orders of magnitude faster (6% runtime overhead) than state-of-the-art taint analysis techniques. Expanding beyond LDX, I have proposed a model based causality inference system, MCI [2]. MCI is practical as it does not require any modication or instrumentation to end-user systems, and it is more accurate and precise (0.1% FP/FN) than the previous state-of-the-art technique BEEP [13] which does require instrumentation (12.8% FP/0.3% FN). LDX andMCI are currently going through tech-transfer as part of theDARPA Transparent Computing (TC) Program, a $5.3 million joint program between SRI International, Purdue Univ., Univ. of Wisconsin-Madison, and Univ. of Georgia. 2 Reverse-engineering through cross-platform binary analysis. e recent rise of IoT devices (predicted to reach 20.4 billion by 2020 [14]) such as wearable devices, drones, and self-driving cars raises alarming security concerns. In 2016, 7 massive Distributed Denial of Service (DDoS) aacks were all carried out by compromised IoT devices. Popular websites such asAmazon, CNN, and PayPal were aected. In particular, Dyn, a DNS service provider and a victim of one of the aacks, lost 24% of customers. During the aacks, compromised devices coordinated malicious activities through Command and Control (C&C) protocols. Hence, understanding C&C messages is essential for revealing an aacker’s intentions. However, there are two prominent challenges: (1) they target various platforms and architectures (such as ARM, MIPS, and AVR) which many advanced analysis tools do not support, and (2) C&C servers are oen not accessible in practice, making reverse-engineering of C&C messages dicult. My research has introduced new paradigms in cross-platform aack investigation (e.g., IoT aack investigation). Rather than re-implementing analysis tools on multiple platforms, my work enables transforming a program execution on a platform (e.g., ARM Raspberry Pi) into another platform (e.g., x86 Linux) where various analysis tools (e.g., Pin/Valgrind) are already available. My technique, PIEtrace [3], traces and transforms an IoT program execution into a platform-independent C program that can be compiled and run on other platforms. PIEtrace was honored with the Best Paper Award (1/317) and the ACM SIGSOFT Distinguished Paper Award (3/317). Moreover, I have developed a novel system, called P2C [4], which reverse-engineers types and semantics of unknown les and C&C messages in the following scenario: understanding C&C messages generated in the past and in the absence of C&C servers. P2C has been used to reveal the semantics of C&C messages generated by the Zeus malware, one of the largest known botnets, which infected 3.6 million systems. 3 So ware Exploit Prevention via Input Randomization. Proactively protecting systems against a wide spectrum of soware exploit aacks is of the utmost importance. Unfortunately, the ever-expanding variety of aack vectors and methods makes such defenses dicult. Protection targeting specic aacks such as ROP, use-aer-free, and type-confusion can hardly keep up with rapidly growing new aack vectors. I have designed a novel soware protection system, A2C [5], that prevents a wide range of aacks by randomizing inputs such that any malicious payloads contained in the inputs are corrupted. e protection provided by A2C is both general (e.g., against various aack vectors including buer-overow, integer-overow, use-aer-free, type-confusion, and ROP) and practical (7% runtime overhead). More importantly, the idea is applicable to many platforms. Specically, my colleagues and I have designed PAD [7], a system that prevents malicious payloads in malvertising aacks on web systems via input randomization. PAD successfully prevented real-world malvertising aacks including the AdGholas malvertising campaign [15] which aected thousands of victims everyday for over a year using a sophisticated steganography technique.
منابع مشابه
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic
Smartphone apps have changed the way we interact with online services, but highly specialized apps come at a cost to privacy. In this paper we will demonstrate that a passive eavesdropper is capable of identifying finegrained user activities within the wireless network traffic generated by apps. Despite the widespread use of fully encrypted communication, our technique, called NetScope, is base...
متن کاملBridging statistical learning and formal reasoning for cyber attack detection
Pei, Kexin M.S., Purdue University, May 2016. Bridging Statistical Learning and Formal Reasoning for Cyber Attack Detection. Major Professors: Dongyan Xu, Xiangyu Zhang and Luo Si. Current cyber-infrastructures are facing increasingly stealthy attacks that implant malicious payloads under the cover of benign programs. Current attack detection approaches based on statistical learning methods may...
متن کاملJ-Force: Forced Execution on JavaScript
Web-based malware equipped with stealthy cloaking and obfuscation techniques is becoming more sophisticated nowadays. In this paper, we propose J-FORCE, a crash-free forced JavaScript execution engine to systematically explore possible execution paths and reveal malicious behaviors in such malware. In particular, JFORCE records branch outcomes and mutates them for further explorations. J-FORCE ...
متن کاملA2C: Self Destructing Exploit Executions via Input Perturbation
Malicious payload injection attacks have been a serious threat to software for decades. Unfortunately, protection against these attacks remains challenging due to the ever increasing diversity and sophistication of payload injection and triggering mechanisms used by adversaries. In this paper, we develop A2C, a system that provides general protection against payload injection attacks. A2C is ba...
متن کاملA New Statement for Selection and Exception Handling in Imperative Languages
Diverse selection statements – if -then-else, switchand try-catch– are commonly used in modern programming languages. To make things simple, we propose a unifying statement for selection. This statement is of the form choose(G1, . . . , Gn) where each Gi is a statement. It has a a simple semantics: choose a successful statement Gi and then proceeds with executing Gi. Examples will be provided f...
متن کاملMutually Exclusive Procedures in Imperative Languages
To represent mutually exclusive procedures, we propose a choice-conjunctive declaration statement of the form uchoo(S,R) where S,R are the procedure declaration statements within a module. This statement has the following semantics: request the machine to choose a successful one between S and R. This statement is useful for representing objects with mutually exclusive procedures. We illustrate ...
متن کامل