TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective
Acquiring and analyzing exploits, which take advantage of vulnerabilities to conduct malicious actions, are crucial for victims (and defenders) when responding to system compromising incidents. However, exploits are sensitive and valuable assets that are not available to victims. The most common res...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on dependable and secure computing 2023-11, Vol.20 (6), p.1-15 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 15 |
---|---|
container_issue | 6 |
container_start_page | 1 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 20 |
creator | Pei, Zhongyu Chen, Xingman Yang, Songtao Duan, Haixin Zhang, Chao |
description | Acquiring and analyzing exploits, which take advantage of vulnerabilities to conduct malicious actions, are crucial for victims (and defenders) when responding to system compromising incidents. However, exploits are sensitive and valuable assets that are not available to victims. The most common resource available for victims to investigate is network traffic, which covers the exploitation period. Thus reconstructing exploits from network traffic is demanded. In practice, the reconstruction process is performed manually, thus inefficient and non-scalable. In this paper, we present an automated solution TAICHI to reconstruct exploits from network traffic, able to generate replica exploits and facilitate timely incident analysis. By nature, a working exploit has to satisfy (1) path constraints which ensure the program path same as the original exploit's is explored and the same vulnerability is triggered, and (2) exploit constraints which ensure the same exploitation strategy is applied, e.g., to bypass deployed defenses or to stitch multiple gadgets together. We propose a hybrid solution to this problem by integrating techniques including multi-version execution (MVE), dynamic taint analysis (DTA), and concolic execution. We have implemented a prototype of TAICHI on x86 and x86-64 Linux and tested it on the Cyber Grand Challenge (CGC) dataset, several Capture the Flag (CTF) challenges, and Metasploit exploit modules targeting real world applications. The evaluation results showed that TAICHI could reconstruct exploits efficiently with a high success rate. Moreover, it could be applied to production environments without disrupting running services, and could reconstruct exploits even if only one round of exploitation traffic is available. |
doi_str_mv | 10.1109/TDSC.2022.3191693 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10043784</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10043784</ieee_id><sourcerecordid>2889730518</sourcerecordid><originalsourceid>FETCH-LOGICAL-c294t-80b22790cf1e7c7ce5a2fbe536e724c75198f97546320eaf55850f6b3365a4f43</originalsourceid><addsrcrecordid>eNpNkE1LAzEQhoMoWKs_QPAQ8OBpaz43ibeybe1CRaGr4ClswwS2dD9MtqL_3i3twdPMwPPODA9Ct5RMKCXmsZitswkjjE04NTQ1_AyNqBE0IYTq86GXQibSKHqJrmLcEsKENmKEVsU0z5b5Ey5C2UTfhhp_tvuA1-AC9Hj-0-3aqo84b_oWv1QN4EVoa1zij8r1Vf0Q8RuE2MEwfMM1uvDlLsLNqY7R-2JeZMtk9fqcZ9NV4pgRfaLJhjFliPMUlFMOZMn8BiRPQTHhlKRGe6OkSDkjUHoptSQ-3XCeylJ4wcfo_ri3C-3XHmJvt8PPzXDSMq2N4kRSPVD0SLnQxhjA2y5UdRl-LSX2IM0epNmDNHuSNmTujpkKAP7xRHClBf8Dzy1mQQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2889730518</pqid></control><display><type>article</type><title>TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective</title><source>IEEE Electronic Library (IEL)</source><creator>Pei, Zhongyu ; Chen, Xingman ; Yang, Songtao ; Duan, Haixin ; Zhang, Chao</creator><creatorcontrib>Pei, Zhongyu ; Chen, Xingman ; Yang, Songtao ; Duan, Haixin ; Zhang, Chao</creatorcontrib><description>Acquiring and analyzing exploits, which take advantage of vulnerabilities to conduct malicious actions, are crucial for victims (and defenders) when responding to system compromising incidents. However, exploits are sensitive and valuable assets that are not available to victims. The most common resource available for victims to investigate is network traffic, which covers the exploitation period. Thus reconstructing exploits from network traffic is demanded. In practice, the reconstruction process is performed manually, thus inefficient and non-scalable. In this paper, we present an automated solution TAICHI to reconstruct exploits from network traffic, able to generate replica exploits and facilitate timely incident analysis. By nature, a working exploit has to satisfy (1) path constraints which ensure the program path same as the original exploit's is explored and the same vulnerability is triggered, and (2) exploit constraints which ensure the same exploitation strategy is applied, e.g., to bypass deployed defenses or to stitch multiple gadgets together. We propose a hybrid solution to this problem by integrating techniques including multi-version execution (MVE), dynamic taint analysis (DTA), and concolic execution. We have implemented a prototype of TAICHI on x86 and x86-64 Linux and tested it on the Cyber Grand Challenge (CGC) dataset, several Capture the Flag (CTF) challenges, and Metasploit exploit modules targeting real world applications. The evaluation results showed that TAICHI could reconstruct exploits efficiently with a high success rate. Moreover, it could be applied to production environments without disrupting running services, and could reconstruct exploits even if only one round of exploitation traffic is available.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2022.3191693</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>Washington: IEEE</publisher><subject>Communications traffic ; Computer science ; Cyberspace ; Differential thermal analysis ; exploit ; Exploitation ; Instruments ; Knowledge engineering ; Monitoring ; Production ; Prototypes ; Taint analysis ; traffic replay ; vulnerability</subject><ispartof>IEEE transactions on dependable and secure computing, 2023-11, Vol.20 (6), p.1-15</ispartof><rights>Copyright IEEE Computer Society 2023</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c294t-80b22790cf1e7c7ce5a2fbe536e724c75198f97546320eaf55850f6b3365a4f43</citedby><cites>FETCH-LOGICAL-c294t-80b22790cf1e7c7ce5a2fbe536e724c75198f97546320eaf55850f6b3365a4f43</cites><orcidid>0000-0001-5903-8554 ; 0000-0001-7894-8828 ; 0000-0002-7120-9261 ; 0000-0003-0083-733X ; 0000-0002-6506-1328</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10043784$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10043784$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Pei, Zhongyu</creatorcontrib><creatorcontrib>Chen, Xingman</creatorcontrib><creatorcontrib>Yang, Songtao</creatorcontrib><creatorcontrib>Duan, Haixin</creatorcontrib><creatorcontrib>Zhang, Chao</creatorcontrib><title>TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>Acquiring and analyzing exploits, which take advantage of vulnerabilities to conduct malicious actions, are crucial for victims (and defenders) when responding to system compromising incidents. However, exploits are sensitive and valuable assets that are not available to victims. The most common resource available for victims to investigate is network traffic, which covers the exploitation period. Thus reconstructing exploits from network traffic is demanded. In practice, the reconstruction process is performed manually, thus inefficient and non-scalable. In this paper, we present an automated solution TAICHI to reconstruct exploits from network traffic, able to generate replica exploits and facilitate timely incident analysis. By nature, a working exploit has to satisfy (1) path constraints which ensure the program path same as the original exploit's is explored and the same vulnerability is triggered, and (2) exploit constraints which ensure the same exploitation strategy is applied, e.g., to bypass deployed defenses or to stitch multiple gadgets together. We propose a hybrid solution to this problem by integrating techniques including multi-version execution (MVE), dynamic taint analysis (DTA), and concolic execution. We have implemented a prototype of TAICHI on x86 and x86-64 Linux and tested it on the Cyber Grand Challenge (CGC) dataset, several Capture the Flag (CTF) challenges, and Metasploit exploit modules targeting real world applications. The evaluation results showed that TAICHI could reconstruct exploits efficiently with a high success rate. Moreover, it could be applied to production environments without disrupting running services, and could reconstruct exploits even if only one round of exploitation traffic is available.</description><subject>Communications traffic</subject><subject>Computer science</subject><subject>Cyberspace</subject><subject>Differential thermal analysis</subject><subject>exploit</subject><subject>Exploitation</subject><subject>Instruments</subject><subject>Knowledge engineering</subject><subject>Monitoring</subject><subject>Production</subject><subject>Prototypes</subject><subject>Taint analysis</subject><subject>traffic replay</subject><subject>vulnerability</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkE1LAzEQhoMoWKs_QPAQ8OBpaz43ibeybe1CRaGr4ClswwS2dD9MtqL_3i3twdPMwPPODA9Ct5RMKCXmsZitswkjjE04NTQ1_AyNqBE0IYTq86GXQibSKHqJrmLcEsKENmKEVsU0z5b5Ey5C2UTfhhp_tvuA1-AC9Hj-0-3aqo84b_oWv1QN4EVoa1zij8r1Vf0Q8RuE2MEwfMM1uvDlLsLNqY7R-2JeZMtk9fqcZ9NV4pgRfaLJhjFliPMUlFMOZMn8BiRPQTHhlKRGe6OkSDkjUHoptSQ-3XCeylJ4wcfo_ri3C-3XHmJvt8PPzXDSMq2N4kRSPVD0SLnQxhjA2y5UdRl-LSX2IM0epNmDNHuSNmTujpkKAP7xRHClBf8Dzy1mQQ</recordid><startdate>20231101</startdate><enddate>20231101</enddate><creator>Pei, Zhongyu</creator><creator>Chen, Xingman</creator><creator>Yang, Songtao</creator><creator>Duan, Haixin</creator><creator>Zhang, Chao</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>JQ2</scope><orcidid>https://orcid.org/0000-0001-5903-8554</orcidid><orcidid>https://orcid.org/0000-0001-7894-8828</orcidid><orcidid>https://orcid.org/0000-0002-7120-9261</orcidid><orcidid>https://orcid.org/0000-0003-0083-733X</orcidid><orcidid>https://orcid.org/0000-0002-6506-1328</orcidid></search><sort><creationdate>20231101</creationdate><title>TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective</title><author>Pei, Zhongyu ; Chen, Xingman ; Yang, Songtao ; Duan, Haixin ; Zhang, Chao</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c294t-80b22790cf1e7c7ce5a2fbe536e724c75198f97546320eaf55850f6b3365a4f43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Communications traffic</topic><topic>Computer science</topic><topic>Cyberspace</topic><topic>Differential thermal analysis</topic><topic>exploit</topic><topic>Exploitation</topic><topic>Instruments</topic><topic>Knowledge engineering</topic><topic>Monitoring</topic><topic>Production</topic><topic>Prototypes</topic><topic>Taint analysis</topic><topic>traffic replay</topic><topic>vulnerability</topic><toplevel>online_resources</toplevel><creatorcontrib>Pei, Zhongyu</creatorcontrib><creatorcontrib>Chen, Xingman</creatorcontrib><creatorcontrib>Yang, Songtao</creatorcontrib><creatorcontrib>Duan, Haixin</creatorcontrib><creatorcontrib>Zhang, Chao</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>ProQuest Computer Science Collection</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Pei, Zhongyu</au><au>Chen, Xingman</au><au>Yang, Songtao</au><au>Duan, Haixin</au><au>Zhang, Chao</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2023-11-01</date><risdate>2023</risdate><volume>20</volume><issue>6</issue><spage>1</spage><epage>15</epage><pages>1-15</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>Acquiring and analyzing exploits, which take advantage of vulnerabilities to conduct malicious actions, are crucial for victims (and defenders) when responding to system compromising incidents. However, exploits are sensitive and valuable assets that are not available to victims. The most common resource available for victims to investigate is network traffic, which covers the exploitation period. Thus reconstructing exploits from network traffic is demanded. In practice, the reconstruction process is performed manually, thus inefficient and non-scalable. In this paper, we present an automated solution TAICHI to reconstruct exploits from network traffic, able to generate replica exploits and facilitate timely incident analysis. By nature, a working exploit has to satisfy (1) path constraints which ensure the program path same as the original exploit's is explored and the same vulnerability is triggered, and (2) exploit constraints which ensure the same exploitation strategy is applied, e.g., to bypass deployed defenses or to stitch multiple gadgets together. We propose a hybrid solution to this problem by integrating techniques including multi-version execution (MVE), dynamic taint analysis (DTA), and concolic execution. We have implemented a prototype of TAICHI on x86 and x86-64 Linux and tested it on the Cyber Grand Challenge (CGC) dataset, several Capture the Flag (CTF) challenges, and Metasploit exploit modules targeting real world applications. The evaluation results showed that TAICHI could reconstruct exploits efficiently with a high success rate. Moreover, it could be applied to production environments without disrupting running services, and could reconstruct exploits even if only one round of exploitation traffic is available.</abstract><cop>Washington</cop><pub>IEEE</pub><doi>10.1109/TDSC.2022.3191693</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0001-5903-8554</orcidid><orcidid>https://orcid.org/0000-0001-7894-8828</orcidid><orcidid>https://orcid.org/0000-0002-7120-9261</orcidid><orcidid>https://orcid.org/0000-0003-0083-733X</orcidid><orcidid>https://orcid.org/0000-0002-6506-1328</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2023-11, Vol.20 (6), p.1-15 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_ieee_primary_10043784 |
source | IEEE Electronic Library (IEL) |
subjects | Communications traffic Computer science Cyberspace Differential thermal analysis exploit Exploitation Instruments Knowledge engineering Monitoring Production Prototypes Taint analysis traffic replay vulnerability |
title | TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T13%3A54%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=TAICHI:%20Transform%20Your%20Secret%20Exploits%20Into%20Mine%20From%20a%20Victim's%20Perspective&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Pei,%20Zhongyu&rft.date=2023-11-01&rft.volume=20&rft.issue=6&rft.spage=1&rft.epage=15&rft.pages=1-15&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2022.3191693&rft_dat=%3Cproquest_RIE%3E2889730518%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2889730518&rft_id=info:pmid/&rft_ieee_id=10043784&rfr_iscdi=true |