Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications
نویسندگان
چکیده
Digital certificates are key component of trust used by many operating systems. Modern operating systems implement a form of digital signature verification for various applications, including kernel driver installation, software execution, etc. Digital signatures rely on digital certificates that authenticate the signature, which then verify the validity of a given signature for a signed binary. Malware attempts to subvert the chain of trust through several techniques to achieve execution, evasion, and persistence. In this paper, we examine a large corpus of malware (3.3 million samples) to extract digital signatures and their corresponding certificates. We examine several characteristics of the digital certificates to study features in the process of malware authorship that will potentially be used for characterizing and classifying malware. We look at many features including the certificate’s chain length, the issue and expiration year, the validity duration of a certificate, the issuing country, validity, top issuing certificate authorities (CAs), and others, highlighting potentially discriminatory features.
منابع مشابه
Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate
Recent measurements of the Windows code-signing certificate ecosystem have highlighted various forms of abuse that allow malware authors to produce malicious code carrying valid digital signatures. However, the underground trade that allows miscreants to acquire such certificates is not well understood. In this paper, we illuminate two aspects of this trade. First, we investigate 4 leading vend...
متن کاملAn efficient certificateless signcryption scheme in the standard model
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
متن کاملBio-inspired Self-organized Public Key Authentication Mechanism for Mobile Ad-hoc Networks
In mobile ad-hoc networks (MANETs), where there is no centralized authority to provide security, trust and reputation mechanisms are applied to maintain security by identifying trustworthy and untrustworthy nodes. However, traditional authentication mechanisms are infeasible for MANETs due to the lack of infrastructure and frequent topology changes. In this paper, we propose a self-organized an...
متن کاملTracking Certificate Misissuance in the Wild
Certificate Authorities (CAs) regularly make mechanical errors when issuing certificates. To quantify these errors, we introduce ZLint, a certificate linter that codifies the policies set forth by the CA/Browser Forum Baseline Requirements and RFC 5280 that can be tested in isolation. We run ZLint on browser-trusted certificates in Censys and systematically analyze how well CAs construct certif...
متن کاملO2: Reviewing the Opportunities and Threats to Psychology and Counseling in Iran
Perhaps before establishing the Psychology and Counseling Organization of Iran by the Parliament in 2003, the biggest threat to this discipline was the practice of unprofessional people. On this basis, the biggest opportunity for this discipline was establishing this organization by the parliament as the supreme legislative body in the country. On 14/11/2012 counseling centers regulation was in...
متن کامل