In recent years, researchers have come up with proof of concepts of seemingly benign applications such as InstaStock and Jekyll that remain dormant until triggered by an attacker-crafted condition, which activates a malicious behavior, eluding code review and signing mechanisms. In this paper, we make a step forward by describing a stealthy injection vector design approach based on Return Oriented Programming (ROP) code reuse that provides two main novel features: 1) the ability to defer the specification of the malicious behavior until the attack is struck, allowing fine-grained targeting of the malware and reuse of the same infection vector for delivering multiple payloads over time; 2) the ability to conceal the ROP chain that specifies the malicious behavior to an analyst by using encryption. We argue that such an infection vector might be a dangerous weapon in the hands of advanced persistent threat actors. As an additional contribution, we report on a preliminary experimental investigation that seems to suggest that ROP-encoded malicious payloads are likely to pass unnoticed by current security solutions, making ROP an effective malware design ingredient.

Borrello, P.; Coppa, Emilio; D'Elia, D. C.; Demetrescu, C.. (2019). The ROP needle: Hiding trigger-based injection vectors via code reuse. In SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (pp. 1962- 1970). Isbn: 9781450359337. Doi: 10.1145/3297280.3297472.

The ROP needle: Hiding trigger-based injection vectors via code reuse

Coppa E.;
2019

Abstract

In recent years, researchers have come up with proof of concepts of seemingly benign applications such as InstaStock and Jekyll that remain dormant until triggered by an attacker-crafted condition, which activates a malicious behavior, eluding code review and signing mechanisms. In this paper, we make a step forward by describing a stealthy injection vector design approach based on Return Oriented Programming (ROP) code reuse that provides two main novel features: 1) the ability to defer the specification of the malicious behavior until the attack is struck, allowing fine-grained targeting of the malware and reuse of the same infection vector for delivering multiple payloads over time; 2) the ability to conceal the ROP chain that specifies the malicious behavior to an analyst by using encryption. We argue that such an infection vector might be a dangerous weapon in the hands of advanced persistent threat actors. As an additional contribution, we report on a preliminary experimental investigation that seems to suggest that ROP-encoded malicious payloads are likely to pass unnoticed by current security solutions, making ROP an effective malware design ingredient.
2019
9781450359337
Antivirus, APT, Code reuse, Malware, ROP
Borrello, P.; Coppa, Emilio; D'Elia, D. C.; Demetrescu, C.. (2019). The ROP needle: Hiding trigger-based injection vectors via code reuse. In SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (pp. 1962- 1970). Isbn: 9781450359337. Doi: 10.1145/3297280.3297472.
File in questo prodotto:
File Dimensione Formato  
Borrello_The-ROP-Needle_2019.pdf

Solo gestori archivio

Tipologia: Versione dell'editore
Licenza: Tutti i diritti riservati
Dimensione 863.75 kB
Formato Adobe PDF
863.75 kB Adobe PDF   Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11385/236302
Citazioni
  • Scopus 16
  • ???jsp.display-item.citation.isi??? 8
  • OpenAlex ND
social impact