Title
Counteracting Data-Only Malware with Code Pointer Examination.
Abstract
As new code-based defense technologies emerge, attackers move to data-only malware, which is capable of infecting a system without introducing any new code. To manipulate the control flow without code, data-only malware inserts a control data structure into the system, for example in the form of a ROP chain, which enables it to combine existing instructions into a new malicious program. Current systems try to hinder data-only malware by detecting the point in time when the malware starts executing. However, it has been shown that these approaches are not only performance consuming, but can also be subverted. In this work, we introduce a new approach, Code Pointer Examination CPE, which aims to detect data-only malware by identifying and classifying code pointers. Instead of targeting control flow changes, our approach targets the control structure of data-only malware, which mainly consists of pointers to the instruction sequences that the malware reuses. Since the control structure is comparable to the code region of traditional malware, this results in an effective detection approach that is difficult to evade. We implemented a prototype for recent Linux kernels that is capable of identifying and classifying all code pointers within the kernel. As our experiments show, our prototype is able to detect data-only malware in an efficient manner less than 1﾿% overhead.
Year
DOI
Venue
2015
10.1007/978-3-319-26362-5_9
RAID
Field
DocType
Citations 
Kernel (linear algebra),Pointer (computer programming),Cryptovirology,Data structure,Computer science,Computer security,Control flow,Real-time computing,Malware,Operating system
Conference
2
PageRank 
References 
Authors
0.37
27
4
Name
Order
Citations
PageRank
Thomas Kittel1323.02
Sebastian Vogl2361.56
Julian Kirsch320.37
Claudia Eckert47613.13