Presentation is loading. Please wait.

Presentation is loading. Please wait.

Term Project: A Survey on Attacking Method with Multimedia Files

Similar presentations


Presentation on theme: "Term Project: A Survey on Attacking Method with Multimedia Files"— Presentation transcript:

1 Term Project: A Survey on Attacking Method with Multimedia Files
An, Sanghong KAIST 2010 KAIST, 2010

2 Contents Introduction Motivation Approach & Cases Countermeasures
Exploit & Vulnerability Code Injection Steganography Countermeasures Conclusion Future Work KAIST, 2010

3 Introduction People's guard on media files is looser than executable files or data files. Due to advance of telecommunication, spread of media file get easier. There are so many methods to infect media file then attack. KAIST, 2010

4 Motivation Trojan Horse – classic, effective way
Ads of anti-virus software Alert on the picture files Increase of damage related to media files Easy to lure people, by issues, unwholesome stuffs, etc. KAIST, 2010

5 Approach & Cases Media files can be used in... Exploit & Vulnerability
A weakness that allows attack on the system Buffer overflow Code Injection Attack on the Web Steganography Hide secret data into the data without corruption KAIST, 2010

6 Approach & Cases Exploits & Vulnerability(1/4)
GDI+ Exploits(2004) JPEG header has a flag of including comment data If you insert a '1' or '0' in this location, the GDI+ code will use this information and overwrite the stack with data, which may allow an attacker to execute their own code. It is valid when the victim just 'see' the infected image KAIST, 2010

7 Approach & Cases Exploits & Vulnerability(2/4)
Gom Player exploits(2007) Stack overflow when processing .asx which is used for playlist. Media Player Classic AVI exploits(2007) Due to an input validation error when processing .AVI files can be exploited to cause a buffer overflow via a .AVI file with a specially crafted "indx" chunk. KAIST, 2010

8 Approach & Cases Exploits & Vulnerability(3/4)
Flash exploits(2009) Some attacks using vulnerability of Adobe Flash Player ATL(Active Template Library) Header vulnerability Heep-overflow/Stack-overflow exploit Null-pointer exploit WMP exploits(2009) Malware infects .mp3, .wma, .avi and requests fake codec KAIST, 2010

9 Approach & Cases Exploits & Vulnerability(4/4)
PDF exploits(2010) Some attacks using vulnerability of javascript module on Adobe Acrobat Reader Recently, Attacking method has discovered that make PDF to execute an embedded executable without exploiting any vulnerability! "/Launch /Action" function – execute 3rd party program for PDF ex) Media Player It is a fundamental problem of PDF structure KAIST, 2010

10 Approach & Cases Code Injection
Include file injection Web language vulnerability PHP, ASP… Insert code in .jpg file header or .gif body Like “<? … ?>”statement of PHP Upload the corrupted image in the web page KAIST, 2010

11 Approach & Cases Steganography
A technique of writing hidden messages in such a way that no one suspects the existence of the message, except of the sender and intended recipient. It can be used to information leak. KAIST, 2010

12 Attacking on Smart Phones with Media Files
It may depend on the vulnerabilities of phone OS… It is harder than attack with ordinary exploits Focusing on the media file! KAIST, 2010

13 Luring Malwares with Media
Mimicking malware in Web Hard Fake the size of file with dummy data Hide in the zipped file Hide in the (faked) Self-Extractor Zip with steganography How about mimicking in the web? KAIST, 2010

14 Countermeasures Zero-day Protection Computer Forensics
Preventing memory corruption Multiple-layer protection Whitelisting Computer Forensics Up-to-date Security KAIST, 2010

15 Conclusion Many attacks with media file use vulnerabilities
Luring malwares Self-extractor of steganography KAIST, 2010

16 References [1]“Steganography Obliterator: An Attack on the Least Significant Bits”, Guillermo A. Francia, InfoSecCD, 2006 [2]“악성코드 분석을 위한 실행압축 해제 기법”, NCSC, 2004 [3]“Data Hiding in Windows Executable Files”, Daemin Shin, Yeog Kim, Keunduck Byun, Sangjin Lee [4]“Steganography for Executables and Code Transformation Signatures”, Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere, ICISC , 2004 [5] “MSN 메신저 PNG 이미지 처리 오버플로우 취약점 분석”, KISA,2005 [6] "Buffer Overrun in JPEG Processing (GDI+) Exploit“, Securiteam [7] JPEG File header [9] "Hydan: Hiding Information in Program Binaries", Rakan El-Khalil and Angelos D. Keromytis, ICISC, 2004 KAIST, 2010


Download ppt "Term Project: A Survey on Attacking Method with Multimedia Files"

Similar presentations


Ads by Google