600 . 643 - Group 2 Report Hiding Code
نویسندگان
چکیده
Though many techniques for finding malicious code have been developed, we found few publicized techniques for creating and hiding malicious code. Traditional malicious code examples include viruses, trojans, and worms, but we define malicious code to be any code that does not behave as the user intended. Our goal is to analyze current methods for the creation and hiding of malicious code and to develop novel programmatic methods for creating malicious code and hiding it. To analyze current methods, we began by searching for existing malicious code hiding tools, but in addition to the paucity of papers on malicious code hiding we found no existing tools. We hypothesize that the lack of code hiding tools is indicative of the nature of this work. Attackers do not want their techniques known, because malicious code detection programs would be adjusted and customized to find those attacks. Though a few articles discuss hiding malicious code in binaries, we limit our work to the source code level. From our research, we found several general categories of code hiding techniques: steganography, plausible deniability, human fallibility, and machine fallibility. Steganography involves hiding malicious code in files other than source code files, while plausible deniability focuses on injecting vulnerabilities that could simply be human error. Human fallibility exploits human expectations and machine fallibility uses known malicious code detection tools to tailor malicious code hiding methods to escape detection. Code interpretation in general is undecidable making the development of good generalized malicious code injection tools extremely challenging. Our tool design began by using the last technique, machine limitations. We examined methods for finding malicious code and developed techniques to escape detection. Our first tool, All Your Stacks Are Belong To Us, aims to subvert ITS4 [7]. It analyzes source code for possible buffer overflow locations, determines the most dense areas of source code (presumably the most difficult areas for humans to analyze/understand), and in those areas minimally change code to produce overflows. The inspiration for our second tool comes from a combination of the results from static analysis tools and the second technique, plausible deniability. These static-analysis tools report unsafe function calls that could produce vulnerabilities. Our second tool, Captain Careless, searches for safe function calls and replaces them with their unsafe counterparts, removes restrictive permission calls, and replaces permission checks with a constant value of 1 meaning success. Lastly, we propose extensions to our tools and an additional method for developing code hiding tools using abstract syntax trees.
منابع مشابه
Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition
In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria) Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method use...
متن کاملRelationship between Correcting Code and Module Technique in Hiding Secret Data
In this paper, we show the role of modules over rings of finite characteristics in data hiding area. Applications of correcting codes and covering functions in data hiding are shown as special cases of our module approach. Applications of modules over rings of characteristic 2 to design new embedding schemes for hiding secret data in binary images are introduced.
متن کاملData Security through Qr Code Encryption and Steganography
The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response)...
متن کاملHiding Inside HTML and Other Source Codes
Many steganographic techniques [1] [2] [3] [4] were proposed for hiding secret message inside images, the simplest of them being the LSB data hiding [6] [7] [8] [9] [10], [11]. In this paper, we suggest a novel data hiding technique in an Html Web page [12] and also propose some simple techniques to extend the embedding technique to source codes written in any programming language (both case in...
متن کاملEnantioselective decomposition of chiral alkyl bromides on Cu(643): Effects of moving the chiral center
The enantioselective surface chemistry of two chiral alkyl halides, S-1-bromo-2-methylbutane and R-2-bromobutane, have been compared on the naturally chiral Cu(643) surfaces. Temperature programmed reaction spectroscopy was used to quantify the yields of the various decomposition products during heating. A fraction of the adsorbed alkyl bromides desorb intact while the remainder decomposes by d...
متن کامل