Title
BlackBox: lightweight security monitoring for COTS binaries.
Abstract
After a software system is compromised, it can be difficult to understand what vulnerabilities attackers exploited. Any information residing on that machine cannot be trusted as attackers may have tampered with it to cover their tracks. Moreover, even after an exploit is known, it can be difficult to determine whether it has been used to compromise a given machine. Aviation has long-used black boxes to better understand the causes of accidents, enabling improvements that reduce the likelihood of future accidents. Many attacks introduce abnormal control flows to compromise systems. In this paper, we present BlackBox, a monitoring system for COTS software. Our techniques enable BlackBox to efficiently monitor unexpected and potentially harmful control flow in COTS binaries. BlackBox constructs dynamic profiles of an application's typical control flows to filter the vast majority of expected control flow behavior, leaving us with a manageable amount of data that can be logged across the network to remote devices. Modern applications make extensive use of dynamically generated code, some of which varies greatly between executions. We introduce support for code generators that can detect security-sensitive behaviors while allowing BlackBox to avoid logging the majority of ordinary behaviors. We have implemented BlackBox in DynamoRIO. We evaluate the runtime overhead of BlackBox, and show that it can effectively monitor recent versions of Microsoft Office and Google Chrome. We show that in ROP, COOP, and state- of-the-art JIT injection attacks, BlackBox logs the pivotal actions by which the attacker takes control, and can also blacklist those actions to prevent repeated exploits.
Year
DOI
Venue
2016
10.1145/2854038.2854062
CGO
Keywords
Field
DocType
Software Security, Program Monitoring, Control Flow Integrity, Binary Rewriting, Dynamic Code Generation
Computer science,Computer security,Software security assurance,Control flow,Server,Parallel computing,Blacklist,Real-time computing,Software system,Exploit,Software,Black box
Conference
ISSN
ISBN
Citations 
2164-2397
978-1-5090-4245-6
1
PageRank 
References 
Authors
0.35
34
3
Name
Order
Citations
PageRank
Byron Hawkins110.69
Brian Demsky250033.84
Michael Bedford Taylor31707154.51