Prof. Dr. Marc Rennhard Head of Information Security Research Group

Slides:



Advertisements
Similar presentations
Performance Testing - Kanwalpreet Singh.
Advertisements

Chapter 17: WEB COMPONENTS
Fast and Precise In-Browser JavaScript Malware Detection
By Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna Network and Distributed System Security(NDSS ‘07)
ACTIVE X By Ethan Huang. OUTLINE What is ActiveX? Component of ActiveX Why ActiveX? ActiveX and Java Security Issue.
Leveraging User Interactions for In-Depth Testing of Web Application Sean McAllister Secure System Lab, Technical University Vienna, Austria Engin Kirda.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
EECS 354: Network Security Group Members: Patrick Wong Eric Chan Shira Schneidman Web Attacks Project: Detecting XSS and SQL Injection Vulnerabilities.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
Unveiling Zeus Automated Classification of Malware Samples Abedelaziz Mohaisen Omar Alrawi Verisign Inc, VA, USA Verisign Labs, VA, USA
October 20-23rd, 2015 FEEBO: A Framework for Empirical Evaluation of Malware Detection Resilience Against Behavior Obfuscation Sebastian Banescu Tobias.
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
Constraint Framework, page 1 Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Constraints approach.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Manufacturing Productivity Solutions Management Metrics for Lean Manufacturing Companies Total Productive Maintenance (T.P.M.) Overall Equipment Effectivity.
Software Testing Training Online. Software testing is ruling the software business in current scenario. It provides an objective, independent view of.
Introduction to Machine Learning, its potential usage in network area,
Security and resilience for Smart Hospitals Key findings
Making the Case for Business Intelligence
BUILD SECURE PRODUCTS AND SERVICES
Horizon 2020 Secure Societies European Info Day and Brokerage Event
Unit 20 - Client Side Customisation of Web Pages
Chapter 19: Network Management
Chapter 8 Environments, Alternatives, and Decisions.
Manuel Brugnoli, Elisa Heymann UAB
Presentation by: Naga Sri Charan Pendyala
Manufacturing Productivity Solutions
Automatic Web Security Unit Testing: XSS Vulnerability Detection Mahmoud Mohammadi, Bill Chu, Heather Richter, Emerson Murphy-Hill Presenter:
Section 6.3 Server-side Scripting
Classifications of Software Requirements
Evolution of UML.
A lustrum of malware network communication: Evolution & insights
Netscape Application Server
PLM, Document and Workflow Management
Software Architecture in Practice
Static Detection of Cross-Site Scripting Vulnerabilities
Compliance with hardening standards
Jack Pokrzywa Director Ground Vehicle Standards, SAE International
Mobile Application Test Case Automation
Putting It All Together
Putting It All Together
Software Engineering Architectural Design Chapter 6 Dr.Doaa Sami
APARTMENT MAINTENANCE SYSTEM
^ About the.
Security Engineering.
EIN 6133 Enterprise Engineering
BotCatch: A Behavior and Signature Correlated Bot Detection Approach
IBM Start Now Host Integration Solutions
Information and documentation media systems.
MANAGEMENT INFORMATION SYSTEM MEHTAP PARLAK Industrial Engineering Department, Dokuz Eylul University, Turkey 1.
2018 Real Cisco Dumps IT-Dumps
Important Software Performance Testing That Ensure High Quality Solutions.
Intro to Ethical Hacking
CIS16 Application Development – Programming with Visual Basic
Group Truck Technology, Powetrain Engineering, Control Systems dept.
Specification of Countermeasures for CYRAIL
CS240: Advanced Programming Concepts
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
Introduction to the PRISM Framework
PERFORMANCE TESTING.
Coordinated Security Response
Engineering Secure Software
Module 4 System and Application Security
Yining ZHAO Computer Network Information Center,
Exploring DOM-Based Cross Site Attacks
T-FLEX DOCs PLM, Document and Workflow Management.
TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation By Prudhvi raju G id:
Presentation transcript:

Swiss Cyber Storm 2016 – Turbo Talk Client TLS Testing Detecting Obfuscated JavaScripts Prof. Dr. Marc Rennhard Head of Information Security Research Group Institute of Applied Information Technology (InIT) ZHAW School of Engineering rema@zhaw.ch

About the Information Security Research Group Part of InIT at ZHAW InIT: Institute of Applied Information Technology ZHAW: Zurich University of Applied Sciences 3 professors/lecturers, 8-10 researchers Main activity: Applied research projects with industrial / academic partners ≈20 large R&D projects during the past 10 years (mostly CTI and EU) One key research area: Automated security analysis and security testing

Client TLS Testing Motivation TLS is the most widely used secure communication protocol Several services and tools to test the security of TLS servers Only few tools to test the security of client-side TLS implementations and configurations Goal: Develop a powerful tool for client TLS testing Current focus on testing the processing of server certificates Very security-critical component as wrong handling of certificates may allow e.g. MITM attacks Basic functionality Testing tool runs as a TLS server application The client is used to repeatedly initiate TLS sessions with the tool The tool uses each TLS session to perform a different certificate test case Analyzing the behavior of the client, the tool rates a test as passed / failed Use any TLS client application to be tested 1 Testing tool runs as TLS server application 2

Client TLS Testing – Tool Usage in Practice Now the client application to test can initiate repeatedly TLS sessions with the testing tool and during each TLS session, a certificate test case is carried out: Passed means the behavior is according to the RFC / no security problem Failed means not compliant with the RFC / potential security problem Two modes of operation Interactive mode: User has to reinitiate TLS sessions manually Automated mode: Client automatically initiates multiple TLS sessions +120 certificate tests integrated, covering various aspects of certificates and certificate chains

Client TLS Testing – Web-based Service You just have to click a button, which creates a testing tool instance just for you. You can then use this instance to test any client application you want.

Client TLS Testing – Status and Outlook Current status and next steps Tool works well to efficiently test client-side TLS implementations Systematically test all widespread browsers and TLS libraries with the goal to find security problems Future plans Public release of the testing tool Provide Web-based service / release tool as open source software Extend with further tests, e.g. TLS protocol fuzzing Thanks to all people involved! Stefan Berhardsgrütter, Lucas Graf, Damiano Esposito (InIT) Tobias Ospelt (modzero) First results are «interesting», but more analysis required

Detecting Obfuscated JavaScripts Motivation JavaScript is often used as an attack vector to deliver malware XSS vulnerabilities, Web-based malware distribution (drive-by),... Detection using signature-based approaches are not ideal, easy to circumvent e.g. by obfuscating JavaScripts Most malicious JavaScripts are obfuscated Benign JavaScripts are usually not obfuscated If obfuscated JavaScripts can be reliably detected, this serves as a good first indicator whether a script is malicious / benign Goal of the project: Find a method to classify JavaScripts as obfuscated / non-obfuscated with high accuracy Based on a machine learning approach

Detecting Obfuscated JavaScripts – Data Set Having a large, representative data set with correctly labelled samples is key to machine learning Out data set consists of +100'000 JavaScripts From different sources: top global websites, JavaScript libraries, MELANI (malicious samples) Includes samples from more than 10 different obfuscators The data set was used to train different binary classifier The trained classifier takes any JavaScript as input and classifies it as obfuscated / non-obfuscated

Detecting Obfuscated JavaScripts – Classification Performance Boosted Decision Tree performed best to solve the problem Two important values to assess the performance of trained machine learning models are precision and recall With BDT, we could achieve values of 99% or better Less than 1 out of 100 JavaScripts is classified incorrectly

Detecting Obfuscated JavaScripts – Conclusions and Outlook Key Findings Machine learning works well to classify obfuscated / non-obfuscated JavaScripts Machine Learning is no magic solution: correctly classifying a script that uses an obfuscator not present in the training set is much more difficult Try it out: http://jsclassify.azurewebsites.net/ Future work Our classifier serves as a good indicator for malicious / benign JavaScripts, but the ultimate goal is to have a classifier that outputs malicious / benign Main obstacle: Number of malicious samples in the data set is currently not representative enough (only about 2'700 samples) Publications S. Aebersold, K. Kryszczuk, S. Paganoni, B. Tellenbach, T. Trowbridge. Detecting Obfuscated JavaScripts Using Machine Learning. ICIMP 2016 B. Tellenbach, S. Paganoni, M. Rennhard. Detecting Obfuscated JavaScripts from Known and Unknown Obfuscators using Machine Learning (under review) It depends on how well the used obfuscator is represented by the obfuscators in the training set.