首页> 外文期刊>Empirical Software Engineering >Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
【24h】

Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge

机译:在专业环境和公开挑战中执行攻击任务时了解黑客的行为

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

When critical assets or functionalities are included in a piece of software accessible to the end users, code protections are used to hinder or delay the extraction or manipulation of such critical assets. The process and strategy followed by hackers to understand and tamper with protected software might differ from program understanding for benign purposes. Knowledge of the actual hacker behaviours while performing real attack tasks can inform better ways to protect the software and can provide more realistic assumptions to the developers, evaluators, and users of software protections. Within Aspire, a software protection research project funded by the EU under framework programme FP7, we have conducted three industrial case studies with the involvement of professional penetration testers and a public challenge consisting of eight attack tasks with open participation. We have applied a systematic qualitative analysis methodology to the hackers' reports relative to the industrial case studies and the public challenge. The qualitative analysis resulted in 459 and 265 annotations added respectively to the industrial and to the public challenge reports. Based on these annotations we built a taxonomy consisting of 169 concepts. They address the hacker activities related to (i) understanding code; (ii) defining the attack strategy; (iii) selecting and customizing the tools; and (iv) defeating the protections. While there are many commonalities between professional hackers and practitioners, we could spot many fundamental differences. For instance, while industrial professional hackers aim at elaborating automated and reproducible deterministic attacks, practitioners prefer to minimize the effort and try many different manual tasks. This analysis allowed us to distill a number of new research directions and potential improvements for protection techniques. In particular, considering the critical role of analysis tools, protection techniques should explicitly attack them, by exploiting analysis problems and complexity aspects that available automated techniques are bad at addressing.
机译:当关键资产或功能包含在最终用户可访问的软件中时,将使用代码保护来阻止或延迟此类关键资产的提取或操纵。黑客了解和篡改受保护软件所遵循的过程和策略可能与出于良性目的而对程序的了解有所不同。了解黑客在执行实际攻击任务时的实际行为,可以提供更好的方法来保护软件,并且可以为软件保护的开发人员,评估人员和用户提供更现实的假设。在Aspire(一个由欧盟根据框架计划FP7资助的软件保护研究项目)中,我们进行了三个行业案例研究,其中包括专业渗透测试人员的参与和一次公开挑战,其中包括八个公开参与的攻击任务。我们已将有关行业案例研究和公众挑战的黑客报告应用了系统的定性分析方法。定性分析结果分别为工业和公共挑战报告添加了459和265注释。基于这些注释,我们建立了包含169个概念的分类法。他们针对与(i)了解代码有关的黑客活动; (ii)定义攻击策略; (iii)选择和定制工具; (iv)取消保护措施。尽管专业黑客和从业者之间存在许多共性,但我们可以发现许多基本差异。例如,虽然工业级专业黑客旨在精心设计自动化且可再现的确定性攻击,但从业人员更愿意尽量减少工作量并尝试许多其他手动任务。这项分析使我们能够提炼出许多新的研究方向以及保护技术的潜在改进。特别地,考虑到分析工具的关键作用,保护技术应通过利用分析问题和复杂性方面来明确地攻击它们,而这些问题和复杂性方面是可用的自动化技术难以解决的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号