Arxiv:1611.10231V1 [Cs.CR] 30 Nov 2016 a INTRODUCTION 1
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Towards a Toolchain for Exploiting Smart Contracts on the Ethereum Blockchain
Towards a Toolchain for Exploiting Smart Contracts on the Ethereum Blockchain by Sebastian Kindler M.A., University of Bayreuth, 2011 Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in the Computer Science Program Faculty of Computer Science Supervisor: Prof. Dr. Stefan Traub Second Assessor: Prof. Dr. Markus Schäffter External Assessor: Dr. Henning Kopp Ulm University of Applied Sciences March 22, 2019 Abstract The present work introduces the reader to the Ethereum blockchain. First, on a con- ceptual level, explaining general blockchain concepts, and viewing the Ethereum blockchain in particular from different perspectives. Second, on a practical level, the main components that make up the Ethereum blockchain are explained in detail. In preparation for the objective of the present work, which is the analysis of EVM bytecode from an attacker’s perspective, smart contracts are introduced. Both, on the level of EVM bytecode and Solidity source code. In addition, critical assem- bly instructions relevant to the exploitation of smart contracts are explained in detail. Equipped with a definition of what constitutes a vulnerable contract, further practical and theoretical aspects are discussed: The present work introduces re- quirements for a possible smart contract analysis toolchain. The requirements are viewed individually, and theoretical focus is put on automated bytecode analysis and symbolic execution as this is the underlying technique of automated smart contract analysis tools. The importance of semantics is highlighted with respect to designing automated tools for smart contract exploitation. At the end, a min- imal toolchain is presented, which allows beginners to efficiently analyze smart contracts and develop exploits. -
Radare2 Book
Table of Contents introduction 1.1 Introduction 1.2 History 1.2.1 Overview 1.2.2 Getting radare2 1.2.3 Compilation and Portability 1.2.4 Compilation on Windows 1.2.5 Command-line Flags 1.2.6 Basic Usage 1.2.7 Command Format 1.2.8 Expressions 1.2.9 Rax2 1.2.10 Basic Debugger Session 1.2.11 Contributing to radare2 1.2.12 Configuration 1.3 Colors 1.3.1 Common Configuration Variables 1.3.2 Basic Commands 1.4 Seeking 1.4.1 Block Size 1.4.2 Sections 1.4.3 Mapping Files 1.4.4 Print Modes 1.4.5 Flags 1.4.6 Write 1.4.7 Zoom 1.4.8 Yank/Paste 1.4.9 Comparing Bytes 1.4.10 Visual mode 1.5 Visual Disassembly 1.5.1 2 Searching bytes 1.6 Basic Searches 1.6.1 Configurating the Search 1.6.2 Pattern Search 1.6.3 Automation 1.6.4 Backward Search 1.6.5 Search in Assembly 1.6.6 Searching for AES Keys 1.6.7 Disassembling 1.7 Adding Metadata 1.7.1 ESIL 1.7.2 Scripting 1.8 Loops 1.8.1 Macros 1.8.2 R2pipe 1.8.3 Rabin2 1.9 File Identification 1.9.1 Entrypoint 1.9.2 Imports 1.9.3 Symbols (exports) 1.9.4 Libraries 1.9.5 Strings 1.9.6 Program Sections 1.9.7 Radiff2 1.10 Binary Diffing 1.10.1 Rasm2 1.11 Assemble 1.11.1 Disassemble 1.11.2 Ragg2 1.12 Analysis 1.13 Code Analysis 1.13.1 Rahash2 1.14 Rahash Tool 1.14.1 Debugger 1.15 3 Getting Started 1.15.1 Registers 1.15.2 Remote Access Capabilities 1.16 Remoting Capabilities 1.16.1 Plugins 1.17 Plugins 1.17.1 Crackmes 1.18 IOLI 1.18.1 IOLI 0x00 1.18.1.1 IOLI 0x01 1.18.1.2 Avatao 1.18.2 R3v3rs3 4 1.18.2.1 .intro 1.18.2.1.1 .radare2 1.18.2.1.2 .first_steps 1.18.2.1.3 .main 1.18.2.1.4 .vmloop 1.18.2.1.5 .instructionset 1.18.2.1.6 -
Improving Mobile-Malware Investigations with Static and Dynamic Code Analysis Techniques
IMPROVING MOBILE-MALWARE INVESTIGATIONS WITH STATIC AND DYNAMIC CODE ANALYSIS TECHNIQUES Vom Fachbereich Informatik (FB 20) der Technischen Universität Darmstadt zur Erlangung des akademischen Grades eines Doktor-Ingenieurs (Dr.-Ing.) genehmigte Dissertation von Siegfried Rasthofer, M.Sc. geboren in Landshut, Deutschland. Referenten: Prof. Dr. Eric Bodden (Referent) Prof. Dr. Andreas Zeller (Korreferent) Prof. Dr. Mira Mezini (Korreferentin) Tag der Einreichung: 7. November 2016 Tag der Disputation: 22. Dezember 2016 Darmstadt 2017 Hochschulkennziffer: D17 Siegfried Rasthofer: Improving Mobile-Malware Investigations with Static and Dynamic Code Analysis Techniques © January 2017 phd referees: Prof. Dr. Eric Bodden Prof. Dr. Andreas Zeller Prof. Dr. Mira Mezini further phd committee members: Prof. Dr. Reiner Hähnle Prof. Dr. Christian Bischof Prof. Dr. Patrick Eugster Darmstadt, Germany January 2017 ABSTRACT Similar to the PC world, the abundance of mobile malware has become a serious threat to smartphone users. Thousands of new apps or app versions are uploaded to popular app stores every day. All of them need to be analyzed against violations of the app store’s content policy. In particular, one wishes to detect whether an application contains malicious behavior. Similarly, antivirus companies check thousands of apps every day to determine whether or not they are malicious. Both app store operators and antivirus vendors face the same problem: it is generally challenging to tell apart malware from benign applications. This is because malware developers aim to hide their applications’ malicious behavior as long as possible from being detected by applying different obfuscation techniques. The raising sophistication with which such measures are implemented pose a serious problem not just to automated malware detection approaches but also to the manual analysis of potential malware by human experts. -
Android Malware and Analysis
ANDROID MALWARE AND ANALYSIS Ken Dunham • Shane Hartman Jose Andre Morales Manu Quintans • Tim Strazzere Click here to buy Android Malware and Analysis CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2015 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed on acid-free paper Version Date: 20140918 International Standard Book Number-13: 978-1-4822-5219-4 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. -
Analyzing and Detecting Emerging Internet of Things Malware: a Graph-Based Approach
This is the author's version of an article that has been published in this journal. Changes were made to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/10.1109/JIOT.2019.2925929 1 Analyzing and Detecting Emerging Internet of Things Malware: A Graph-based Approach Hisham Alasmaryzy, Aminollah Khormaliy, Afsah Anwary, Jeman Parky, Jinchun Choi{y, Ahmed Abusnainay, Amro Awady, DaeHun Nyang{, and Aziz Mohaiseny yUniversity of Central Florida zKing Khalid University {Inha University Abstract—The steady growth in the number of deployed Linux-like capabilities. In particular, Busybox is widely used Internet of Things (IoT) devices has been paralleled with an equal to achieve the desired functionality; based on a light-weighted growth in the number of malicious software (malware) targeting structure, it supports utilities needed for IoT devices. those devices. In this work, we build a detection mechanism of IoT malware utilizing Control Flow Graphs (CFGs). To motivate On the other hand, and due to common structures, the for our detection mechanism, we contrast the underlying char- Linux capabilities of the IoT systems inherit and extend the acteristics of IoT malware to other types of malware—Android potential threats to the Linux system. Executable and Linkable malware, which are also Linux-based—across multiple features. Format (ELF), a standard format for executable and object The preliminary analyses reveal that the Android malware have code, is sometimes exploited as an object of malware. The high density, strong closeness and betweenness, and a larger number of nodes. -
A Novel Two-Factor Honeytoken Authentication Mechanism
A novel Two-Factor HoneyToken Authentication Mechanism Vassilis Papaspirou Leandros Maglaras Mohamed Amine Ferrag Department of Computer Science Cyber Technology Institute Department of Computer Science University of Thessaly De Montfort University University of Guelma Volos, Greece Leicester, UK Guelma, Algeria [email protected] [email protected] [email protected] Ioanna Kantzavelou Helge Janicke Christos Douligeris Department of Informatics Cyber Security Cooperative Research Centre Department of Informatics University of West of Attica Edith Cowan University University of Piraeus Athens, Greece Australia [email protected] [email protected] [email protected] Abstract—The majority of systems rely on user authentication guessing, etc. Several best practices have been suggested on passwords, but passwords have so many weaknesses and for the use of passwords. Some of them are very difficult widespread use that easily raise significant security concerns, to use and others do not fulfill the security needs of the regardless of their encrypted form. Users hold the same password for different accounts, administrators never check password files organization. To overcome the password problem, two factor for flaws that might lead to a successful cracking, and the lack of authentication using devices such as tokens and ATM cards a tight security policy regarding regular password replacement has been suggested and has been shown to be difficult to hack are a few problems that need to be addressed. The proposed re- [2]. There are several limitations of two-factor authentication, search work aims at enhancing this security mechanism, prevent including the cost of purchasing, issuing, and handling tokens penetrations, password theft, and attempted break-ins towards securing computing systems. -
Android Reverse Engineering: Understanding Third-Party Applications
Android reverse engineering: understanding third-party applications Vicente Aguilera Díaz OWASP Spain Chapter Leader Co-founder of Internet Security Auditors [email protected] Twitter: @vaguileradiaz www.vicenteaguileradiaz.com OWASP EU Tour 2013 Copyright © The OWASP Foundation June 5, 2013. Bucharest (Romania) Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP Foundation http://www.owasp.org Who I am? VICENTE AGUILERA DÍAZ Co-founder of Internet Security Auditors OWASP Spain Chapter Leader More info: www.vicenteaguileradiaz.com OWASP 2 Agenda Reverse engineering: definition and objectives Application analysis workflow Malware identification in Android apps OWASP 3 Reverse engineering: definition and objectives Definition Refers to the process of analyzing a system to identify its components and their interrelationships, and create representations of the system in another form or a higher level of abstraction. [1] Objetives The purpose of reverse engineering is not to make changes or to replicate the system under analysis, but to understand how it was built. OWASP 4 Application analysis workflow Original APK Analyze Decompress and Rebuild Dissassemble APK Modify Scope of this presentation Modified APK OWASP 5 Application analysis workflow App Name SaveAPK Astro File Manager Real APK Leecher APK apktool radare2 unzip AndroidManifest.xml /lib apktool.yml /META-INF /assets /res /res resources.arsc AXMLPrinter2.jar Disasm /smali AndroidManifest.xml Human-readable -
Verifying the Integrity of Open Source Android Applications Michael Macnair
Verifying the Integrity of Open Source Android Applications Michael Macnair Technical Report RHUL–MA–2015–4 4 March 2015 Information Security Group Royal Holloway University of London Egham, Surrey, TW20 0EX United Kingdom www.ma.rhul.ac.uk/tech Michael Macnair Student number: 100761605 Verifying the Integrity of Open Source Android Applications 28th August 2014 Supervisor: Keith Mayes Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from published or unpublished work of other people. I also declare that I have read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences, and in accordance with these regulations I submit this project report as my own work. Signature: Contents Executive Summary 1 1 Introduction 3 1.1 Android and Android Applications . 3 1.2 Reverse Engineering . 4 1.3 Obfuscation . 4 1.4 Verifying Integrity of Binary Distributions . 5 1.5 Objectives . 5 1.6 Report Structure . 6 2 Use Cases for Reversing and Obfuscation 7 2.1 Use Cases . 7 2.2 Conclusion . 10 3 Reverse Engineering Android Applications 11 3.1 The APK File Format . 11 3.2 Techniques . 12 3.3 Tools . 14 4 Verifying Android Application Integrity 23 4.1 APKDiff . 23 4.2 AppIntegrity . 26 5 Analysis of Applications on the Play Store 35 5.1 RedPhone . 35 5.2 ChatSecure . 37 5.3 Telegram . 38 5.4 TextSecure . 40 5.5 Lil’ Debi: Debian Installer . -
A Reverse Engineering Approach
Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2019 Android ransomware trends and case studies: A reverse engineering approach Chenliang Xu Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Computer Engineering Commons Recommended Citation Xu, Chenliang, "Android ransomware trends and case studies: A reverse engineering approach" (2019). Graduate Theses and Dissertations. 17810. https://lib.dr.iastate.edu/etd/17810 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Android ransomware trends and case studies: A reverse engineering approach by Chenliang Xu A thesis submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major: Computer Engineering Program of Study Committee: Yong Guan, Major Professor Daji, Qiao Jaeyoun Kim The student author, whose presentation of the scholarship herein was approved by the program of study committee, is solely responsible for the content of this thesis. The Graduate College will ensure this thesis is globally accessible and will not permit alterations after a degree is conferred. Iowa State University Ames, Iowa 2019 Copyright © Chenliang -
Cardpliance: PCI DSS Compliance of Android Applications
Cardpliance: PCI DSS Compliance of Android Applications Samin Yaseer Mahmud,? Akhil Acharya,? Benjamin Andow,† William Enck,? and Bradley Reaves? ?North Carolina State University †IBM T.J. Watson Research Center Abstract a virtual token that is linked to the actual credit card, and b) Smartphones and their applications have become a predomi- handling both payment information and authorization outside nant way of computing, and it is only natural that they have of the third-party application [3]. However, recent work [8] become an important part of financial transaction technology. reported that 4,433 of a random sample of 50,162 applications However, applications asking users to enter credit card num- from Google Play were asking the user to enter credit card bers have been largely overlooked by prior studies, which information via text fields in the application UI. There are frequently report pervasive security and privacy concerns in many reasons why this may occur. For example, an appli- the general mobile application ecosystem. Such applications cation developer may wish to offer an alternative if the user are particularly security-sensitive, and they are subject to the does not want to use the Google or Apple payment system. Payment Card Industry Data Security Standard (PCI DSS). Alternatively, the application developer may wish to avoid In this paper, we design a tool called Cardpliance, which overhead charges from Google and Apple [37, 38]. Whatever bridges the semantics of the graphical user interface with the reason, the fact remains: applications are asking users to static program analysis to capture relevant requirements from enter credit card information. -
Windows Malware Analysis & Static Analysis Blocking CYS5120 - Malware Analysis Bahcesehir University Cyber Security Msc Program
Code Analysis Analyzing Malicious Windows Programs Static Analysis Blocking Methods 04 - Code Analysis & Windows Malware Analysis & Static Analysis Blocking CYS5120 - Malware Analysis Bahcesehir University Cyber Security Msc Program Dr. Ferhat Ozgur Catak 1 Mehmet Can Doslu 2 [email protected] [email protected] 2017-2018 Fall Dr. Ferhat Ozgur Catak & Mehmet Can Doslu 04 - Code Analysis & Windows Malware Analysis & Static Analysis Blocking Code Analysis Analyzing Malicious Windows Programs Static Analysis Blocking Methods Table of Contents 1 Code Analysis Packers & Unpacking Stack Operations Packer Anatomy Disassembler & Debugger Identifying Packed Programs IDA Pro Automated Unpacking The IDA Pro Interface Manual Unpacking Useful Windows for Analysis Anti-disassembly Lab Jump Instructions with the 2 Analyzing Malicious Windows Same Target Programs A Jump Instruction with a Introduction Constant Condition The Windows API Impossible Disassembly File System Functions The Function Pointer Problem Special Files Return Pointer Abuse The Windows Registry Misusing Structured Exception Networking APIs Handlers Lab Thwarting Stack-Frame 3 Static Analysis Blocking Methods Analysis Dr. Ferhat Ozgur Catak & Mehmet Can Doslu 04 - Code Analysis & Windows Malware Analysis & Static Analysis Blocking Code Analysis Analyzing Malicious Windows Programs Static Analysis Blocking Methods Table of Contents 1 Code Analysis Packers & Unpacking Stack Operations Packer Anatomy Disassembler & Debugger Identifying Packed Programs IDA Pro Automated Unpacking The IDA Pro Interface Manual Unpacking Useful Windows for Analysis Anti-disassembly Lab Jump Instructions with the 2 Analyzing Malicious Windows Same Target Programs A Jump Instruction with a Introduction Constant Condition The Windows API Impossible Disassembly File System Functions The Function Pointer Problem Special Files Return Pointer Abuse The Windows Registry Misusing Structured Exception Networking APIs Handlers Lab Thwarting Stack-Frame 3 Static Analysis Blocking Methods Analysis Dr. -
Happer: Unpacking Android Apps Via a Hardware-Assisted Approach
Happer: Unpacking Android Apps via a Hardware-Assisted Approach 1 1 1 2 3 4 5 6 Lei Xue ⇤, Hao Zhou ⇤, Xiapu Luo §, Yajin Zhou , Yang Shi , Guofei Gu , Fengwei Zhang , Man Ho Au 1The Hong Kong Polytechnic University, 2Zhejiang University 3Tongji University, 4Texas A&M University 5Southern University of Science and Technology, 6The University of Hong Kong Abstract—Malware authors are abusing packers (or runtime- TABLE I: An overview of existing unpackers in academia. based obfuscators) to protect malicious apps from being analyzed. Unpacker Effectiveness Hidden Dex file1 Hidden Dex item1 #Behaviors2 Although many unpacking tools have been proposed, they can DexHunter-15 [86] 7 3 be easily impeded by the anti-analysis methods adopted by the AppSpear-15 [79] 7 4 packers, and they fail to effectively collect the hidden Dex data PackerGrind-17 [72] 7 7 AppSpear-18 [53] 7 6 due to the evolving protection strategies of packers. Consequently, DroidUnpack-18 [45] 7 3 many packing behaviors are unknown to analysts and packed DexLego-18 [56] 7 N/A TIRO-18 [70] 7 4 malware can circumvent the inspection. To fill the gap, in this Happer 3 27 paper, we propose a novel hardware-assisted approach that first 1 , , and indicate that all of, partial of, and none of the hidden Dex file (or the other hidden Dex data), respectively, which will be dynamically released by the packers, can be collected by the unpacker. monitors the packing behaviors and then selects the proper 2 approach to unpack the packed apps. Moreover, we develop a #Behavior denotes the number of supported packing behaviors (more details in Table IV).