Presentation is loading. Please wait.

Presentation is loading. Please wait.

2004 Symantec Corporation, All Rights Reserved Principles and Practice of X-raying Frédéric Perriot Peter Ferrie Symantec Security Response.

Similar presentations


Presentation on theme: "2004 Symantec Corporation, All Rights Reserved Principles and Practice of X-raying Frédéric Perriot Peter Ferrie Symantec Security Response."— Presentation transcript:

1 2004 Symantec Corporation, All Rights Reserved Principles and Practice of X-raying Frédéric Perriot Peter Ferrie Symantec Security Response

2 2 – 2004 Symantec Corporation, All Rights Reserved What is x-raying?  A detection method based on breaking the encryption of the virus  Works for weak encryption methods –Recent real-world examples among win32 viruses –Applicable to worms as well  Similar to a ‘known plaintext attack’

3 3 – 2004 Symantec Corporation, All Rights Reserved Example of a ‘known plaintext attack’ From: Peter ? KEY is rot13! Known plaintext From: Peter Subject: Hello VB2004 Decrypted message Corresponding ciphertext Sebz: Crgre Fhowrpg: Uryyb IOZZVI Message encrypted with unknown Caesar cipher

4 4 – 2004 Symantec Corporation, All Rights Reserved Differences between x-raying and ‘known plaintext attacks’  X-raying has lower complexity –Simpler ciphers –Simpler breaking  More constraints for AV than cryptanalysis –Time constraints –Space (memory usage) constraints  Some specific x-raying techniques –Sliding: consider several ciphertexts –Hybrid approaches (using decryptor parsing) –Encryption algorithm not fixed (XOR or ADD or ROL…)

5 5 – 2004 Symantec Corporation, All Rights Reserved Analogous to hidden patterns in pictures  Inverted colors  Stereograms  Images d’Épinal

6 6 – 2004 Symantec Corporation, All Rights Reserved X-raying ‘xor 0xFF’

7 7 – 2004 Symantec Corporation, All Rights Reserved Typical encryption methods  Fixed op and fixed key  A few ops among a set and fixed keys  Multiple layers  Running keys  No key (RDA)  Strong crypto (IDEA virus) –No x-ray but the crypto itself may be detectable!   x  x x

8 8 – 2004 Symantec Corporation, All Rights Reserved A more complex encryption: stereograms cheep, cheep

9 9 – 2004 Symantec Corporation, All Rights Reserved Equivalent to X-raying for stereograms  The encryption method is a special projection of a 3D object onto a 2D image  The decryption key is the divergence angle between the direction of the eyes of the observer  Infinite number of keys (!)  Seeing a stereogram is hard the first time

10 10 – 2004 Symantec Corporation, All Rights Reserved Sliding x-ray  Multiple potential ciphertexts distinguishes x-raying from a regular known plaintext attack  Virus hidden somewhere in the host program –Exact position might not be known because the decryptor is inaccessible (too much I/O)  Often need to x-ray more than one spot –Determine an x-ray region based on geometry of the virus infection method

11 11 – 2004 Symantec Corporation, All Rights Reserved Arriving to the enchanted forest, Feared retreat of two dark giants, A valiant knight provokes them in combat : But the hidden giants do not answer him Practice your sliding x-ray on this Image d’Épinal

12 12 – 2004 Symantec Corporation, All Rights Reserved Approaches to X-raying (theory) 42 = 6 * ?  Key recovery –Attempts to recover the encryption key –May be necessary for host repair  Key validation –Attempts to prove that a valid (sub)key exists  Invariant scanning –Reduces the ciphertext to patterns independent from the encryption key is 7394502 prime? which is divisible by 3: 29369, 117, 3514?

13 13 – 2004 Symantec Corporation, All Rights Reserved Approaches to X-raying (real-world uses)  Key recovery –W32/Magistr –W32/Perenast (aka W32/Stepar)  Key validation –W32/Bagif (useful for variants detection)  Invariant scanning –W32/Efish –W32/Perenast

14 14 – 2004 Symantec Corporation, All Rights Reserved Anatomy of a sample x-ray  Substitution cipher  Used by W32/Efish  Simple and homophonic

15 15 – 2004 Symantec Corporation, All Rights Reserved Can you catch Efish?

16 16 – 2004 Symantec Corporation, All Rights Reserved What about variable plaintext?  So far we assumed plaintext was fixed  Wildcards are possible (see Bagif)  What if the majority of the plaintext varies? I am a bad virus, boo I am a mad virus, boo I am a sad virus, boo I am a bad virus, boo I, virus am a bad boo Bad am I a boo, virus

17 17 – 2004 Symantec Corporation, All Rights Reserved Anamorphosis (‘catoptric’) What would metamorphism look like?

18 18 – 2004 Symantec Corporation, All Rights Reserved DIY catoptric anamorphosis (no assembly required)

19 19 – 2004 Symantec Corporation, All Rights Reserved Anamorphosis without a complex optical system (‘oblique’) “The Ambassadors” Hans Holbein the younger, 1533

20 20 – 2004 Symantec Corporation, All Rights Reserved What to do about metamorphism?  X-raying a metamorphic virus is a little like looking at a stereogram of an anamorphosis  You need to close one eye  You need to diverge your eyes  It’s hard to do both at the same time!  Open question to the audience

21 2004 Symantec Corporation, All Rights Reserved Gunax lbh! Frédéric Perriot fperriot@symantec.com Peter Ferrie pferrie@symantec.com


Download ppt "2004 Symantec Corporation, All Rights Reserved Principles and Practice of X-raying Frédéric Perriot Peter Ferrie Symantec Security Response."

Similar presentations


Ads by Google