Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.

Slides:



Advertisements
Similar presentations
Overview Environment for Internet database connectivity
Advertisements

Welcome to Middleware Joseph Amrithraj
By Hiranmayi Pai Neeraj Jain
Secure web browsers, malicious hardware, and hardware support for binary translation Sam King.
Web Server Hardware and Software
ACTIVE X By Ethan Huang. OUTLINE What is ActiveX? Component of ActiveX Why ActiveX? ActiveX and Java Security Issue.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Kashif Jalal CA-240 (072) Web Development Using ASP.NET CA – 240 Kashif Jalal Welcome to week – 2 of…
1 Classic ASP vs. ASP.NET Technical Information and Market Adoption Lance Welker University of San Diego Dr. Rebman MSIT 526 December 20, 2005.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Building Robust and Automatic Authentication Systems with Activity- Based Personal Questions Mentor: Danfeng Yao Anitra Babic Chestnut Hill College Computer.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
Computer Security and Penetration Testing
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Norman SecureSurf Protect your users when surfing the Internet.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Protecting Your Computer & Your Information
Basics of Web Databases With the advent of Web database technology, Web pages are no longer static, but dynamic with connection to a back-end database.
Web Application Access to Databases. Logistics Test 2: May 1 st (24 hours) Extra office hours: Friday 2:30 – 4:00 pm Tuesday May 5 th – you can review.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Internet, intranet, and multimedia database processing l Database processing across local and wide area networks l Alternative architectures for distributing.
Computer & Network Security
Honeypot and Intrusion Detection System
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
1 Vulnerability Analysis and Patches Management Using Secure Mobile Agents Presented by: Muhammad Awais Shibli.
Master Thesis Defense Jan Fiedler 04/17/98
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
Client Side Vulnerabilities Aka, The Perils of HTTP Lesson 14.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
RST Labs Effectively Constraining Active Scripting on the Win32 Platform Anup K. Ghosh Reliable Software Technologies
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
1 MSCS 237 Overview of web technologies (A specific type of distributed systems)
RST Labs Sandboxing Mobile Code Execution Environments Timothy Hollebeek.
1 Mobile Code l Java Review –Java code is platform independent and runs within a “sandbox”, or a set of restrictions that keep downloaded applets from.
Malicious Software.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
ASP. ASP is a powerful tool for making dynamic and interactive Web pages An ASP file can contain text, HTML tags and scripts. Scripts in an ASP file are.
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Introduction to JavaScript Fort Collins, CO Copyright © XTR Systems, LLC Introduction to JavaScript Programming Instructor: Joseph DiVerdi, Ph.D., MBA.
ASP-2-1 SERVER AND CLIENT SIDE SCRITPING Colorado Technical University IT420 Tim Peterson.
Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Conclusion.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
Introduction to ASP.NET development. Background ASP released in 1996 ASP supported for a minimum 10 years from Windows 8 release ASP.Net 1.0 released.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
TMG Client Protection 6NPS – Session 7.
Critical Security Controls
IT Security  .
PHP / MySQL Introduction
Malware, Phishing and Network Policies
Web Development Using ASP .NET
Chapters 5 & 6 of Web security. pp
6. Application Software Security
Exploring DOM-Based Cross Site Attacks
Presentation transcript:

Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.

Overview Background Preliminary characterization of attacks/threats What we’ve built Coverage of threats Tech Transfer successes Integration

Background: ActiveScripting Microsoft architecture for integrating scripts with applications in a language-neutral way. Scripting is often used as “Turing glue” to connect and drive disparate software components. Active Scripting Applications/Hosts Web browsers Mail readers Embedded HTML viewers MS Office 2000 applications Windows Scripting Host Active Scripting Languages Perl Jscript VBscript/VBA (macros) Rexx Python

Technical Objectives Address the threat of a significant class of mobile malicious code: –ActiveScripting (JScript, VBscript) Provide interception and logging framework that allows policies to be developed and enforced Constrain active scripting capability effectively to balance: –legitimate uses vs. malicious uses

Scope Malicious Scripts on Microsoft Windows based platforms –Script-based viruses, trojans –malicious web pages –malicious HTML embedded in various files –Especially: scripts that use one of about 30 vulnerabilities that allow compromise of the machine from scripts (most recent … 9 days ago)

Attacker Objectives Traditional “malware” activities –Viruses, trojan horses Fully compromising host computers Accessing sensitive data/manipulating sensitive functionality –Compromising script-aware applications –Compromising script-dependent applications

Why is this easy? MS Windows contains lots of bad code and very few boundaries Microsoft architecture is script-friendly “big bag of components” Much of this infrastructure built to support distributed applications

Defenses Must be at the correct level (or multi-level) Most existing defenses aren’t: –Secure sessions –Filtering –Signature schemes –Kernel/filesystem level defenses Commercial world focused on today’s attacks

Categories of Malicious Scripts Easy Hard Very Hard! Malicious scripts distributed as attachments Scripts that exploit the distributed nature of web applications Malicious scripts injected into dynamic web pages Malicious scripts that manipulate legitimate functionality Embedded scripts that exploit flaws in components or host applications

Malicious Script Capability Matrix AttachFlawLegitimateInject Web based ILOVEYOU Kak Malicious web site E*TRADE hack E-bayla Web bugs wiretapping Future threats

Intercepting ActiveScripting What works well: –Blocking access to flawed components/methods Feasible: –Correlating script activity with lower level information –Reducing exposure of script-aware applications –Restricting script actions to safer subset Still difficult: –Script-dependent and script-based applications

Tech Transfer Produced: –Robust prototype Capable of extensive logging of script behavior on a number of machines to a remote server Ability to block malicious script actions Stable, efficient –Developing prototype into a tool to be used by Air Force community –Extensive logs (14,000 distinct scripts, gigabytes of information about their execution) –JustBeFriends (~4000 downloads)

Integration We can provide: Information on all page views Script contents and URLs Information on script behavior During script execution: –Accesses to all members and methods (with parameters) of Automation objects the scripting engine interacts with –All actions of the scripting engine –Other related COM methods (possibly) user level correlation information

Logs 3 Cigital Labs researchers 6-12 months of browsing Work-related and “other” sites Also some “random” browsing (uses Yahoo!)

Architecture Scripting Engine Script Actions Browser Architecture Events Event Manager Policy XML Centralized Logging Server

Conclusions Architecture provides a very successful and flexible way to monitor and control scripts on Windows systems Can address commonly exploited risks from malicious scripts, which are unaddressed by current generation of commercial tools Work still needed to get a handle on more complex attacks

END The End