Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/99395
Title: Casting exploit analysis as a Weird Machine reconstruction problem
Authors: Abela, Robert
Vella, Mark Joseph
Keywords: Malware (Computer software)
Computer security
Binary control systems
Issue Date: 2021
Publisher: arXiv
Citation: Abela, R., & Vella, M. (2021). Casting exploit analysis as a Weird Machine reconstruction problem. arXiv preprint arXiv:2109.13100.
Abstract: Exploits constitute malware in the form of application inputs. They take advantage of security vulnerabilities inside programs in order to yield execution control to attackers. The root cause of successful exploitation lies in emergent functionality introduced when programs are compiled and loaded in memory for execution, called ‘Weird Machines’ (WMs). Essentially WMs are unexpected virtual machines that execute attackers’ bytecode, complicating malware analysis whenever the bytecode set is unknown. We take the direction that WM bytecode is best understood at the level of the process memory layout attained by exploit execution. Each step building towards this memory layout comprises an exploit primitive, an exploit’s basic building block. This work presents a WM reconstruction algorithm that works by identifying pre-defined exploit primitive-related behaviour during the dynamic analysis of target binaries, associating it with the responsible exploit segment - the WM bytecode. In this manner any analyst familiar with exploit programming will immediately recognise the reconstructed WM bytecode’s semantics. This work is a first attempt at studying the feasibility of this method and focuses on web browsers when targeted by JavaScript exploits.
URI: https://www.um.edu.mt/library/oar/handle/123456789/99395
Appears in Collections:Scholarly Works - FacICTCS

Files in This Item:
File Description SizeFormat 
Casting_exploit_analysis_as_a_Weird_Machine_reconstruction_problem(2021).pdf662.17 kBAdobe PDFView/Open


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.