首页> 外文会议>International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment >On the Security of Application Installers and Online Software Repositories
【24h】

On the Security of Application Installers and Online Software Repositories

机译:关于应用程序安装程序和在线软件存储库的安全性

获取原文

摘要

The security of application installers is often overlooked, but the security risks associated to these pieces of code are not negligible. Online public repositories have been one of the most popular ways for end users to obtain software, but there is a lack of systematic security evaluation of popular public repositories. In this paper, we bridge this gap by analyzing five popular software repositories. We focus on their software updating dynamics, as well as the presence of traces of vulnerable and/or trojanized applications among the top-100 most downloaded Windows programs on each of the evaluated repositories. We analyzed 2,935 unique programs collected in a period of 144 consecutive days. Our results show that: (i) the repositories frequently exhibit rank changes due to applications fast climbing toward the first positions; (ⅱ) the repositories often update their payloads, which may cause the distribution of distinct binaries for the same intended application (binaries for the same applications may also be different in each repository); (ⅲ) the installers are composed by multiple components and often download payloads from the Internet to complete their installation steps, posing new risks for users (we demonstrate that some installers are vulnerable to content tampering through man-in-the-middle attacks); (ⅳ) the ever-changing nature of repositories and installers makes them prone to abuse, as we observed that 30% of all applications were reported malicious by at least one AV.
机译:应用程序安装程序的安全性通常被忽略,但是与这些代码段相关的安全风险却不可忽略。联机公共存储库一直是最终用户获取软件的最流行方法之一,但是缺少对流行公共存储库的系统安全性评估。在本文中,我们通过分析五个流行的软件存储库来弥合这一差距。我们专注于他们的软件更新动态,以及在每个评估存储库中下载次数最多的前100个Windows程序中,存在漏洞和/或特洛伊木马应用程序的痕迹。我们分析了连续144天收集的2,935个独特程序。我们的结果表明:(i)由于应用程序快速攀升至第一个位置,存储库经常出现等级变化; (ⅱ)存储库经常更新其有效负载,这可能会导致针对相同的预期应用程序分配不同的二进制文件(每个存储库中相同应用程序的二进制文件也可能不同); (ⅲ)安装程序由多个组件组成,通常会从Internet下载有效负载以完成安装步骤,从而给用户带来新的风险(我们证明某些安装程序很容易受到中间人攻击而篡改内容); (ⅳ)存储库和安装程序的不断变化的性质使其易于滥用,因为我们观察到,至少有一个AV报告所有应用程序中有30%被恶意。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号