首页> 外文会议>International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment >Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats
【24h】

Update State Tampering: A Novel Adversary Post-compromise Technique on Cyber Threats

机译:更新状态篡改:一种关于网络威胁的新型对抗后妥协技术

获取原文

摘要

With modern cyber threats, attackers should gain persistency in target systems to achieve attack objectives. Once an attacker's zero-day vulnerabilities on target systems are patched, the attacker may lose control over the system. However, systems remain vulnerable when an attacker manipulates the component resources on a Windows system. We found methods to generate invisible vulnerabilities on a victim's system. Our findings are as follows: first, we found ways to replace a component to an old vulnerable version while maintaining the current update records; second, we found that the Windows system does not recognize the replaced components. We define the first issue as a package-component mismatch and the second issue as a blind spot issue on the Windows update management. They have been identified on all version of Vista and later, including desktop platforms and server platforms. Based on our findings, we reveal an Update State Tampering technique that can generate invisible security holes on target systems. We also offer corresponding countermeasures to detect and correct package-component mismatches. In this paper, we introduce the problems with the current Windows update management mechanism, the Update State Tampering technique from the attacker's point of view, and an Update State Check scheme that detects and recovers the package-component mismatches. We stress that our proposed Update State Check scheme should be deployed immediately in order to mitigate large-scale exploitation of the proposed technique.
机译:凭借现代网络威胁,攻击者应获得目标系统的持久性以实现攻击目标。一旦攻击者对目标系统的零点漏洞进行了修补,攻击者可能会丢失对系统的控制。但是,当攻击者在Windows系统上操纵组件资源时,系统仍然易受攻击。我们发现在受害者系统上生成隐形漏洞的方法。我们的研究结果如下:首先,我们找到了在维护当前更新记录的同时将组件替换为旧弱势版本;其次,我们发现Windows系统无法识别替换组件。我们将第一个问题定义为包组件不匹配,第二个问题是Windows Update Management上的盲点问题。它们已在所有版本的Vista及更高版本上识别,包括桌面平台和服务器平台。基于我们的研究结果,我们揭示了一种更新状态篡改技术,可以在目标系统上生成不可见的安全漏洞。我们还提供相应的对策来检测和正确包装组件不匹配。在本文中,我们介绍了当前Windows更新管理机制的问题,从攻击者的角度来看,更新状态篡改技术,以及检测和恢复包组件不匹配的更新状态检查方案。我们强调我们建议的更新状态检查计划应立即部署,以减轻对所提出的技术的大规模开发。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号