Inscription: Thwarting ActionScript Web Attacks From Within Meera Sridhar∗, Abhinav Mohanty∗, Fadi Yilmaz∗, Vasant Tendulkar∗, and Kevin W. Hamleny ∗Department of Software and Information Systems, University of North Carolina at Charlotte, NC, USA yDepartment of Computer Science, University of Texas at Dallas, TX, USA {msridhar, amohant1, fyilmaz}@uncc.edu,
[email protected],
[email protected] Abstract—The design and implementation of Inscription, the of all these different media formats, leading to a risk of first fully automated Adobe Flash binary code transformation implementation vulnerabilities associated with each format. system that can guard major Flash vulnerability categories with- As a result, the Flash Player regularly has among the top web out modifying vulnerable Flash VMs, is presented and evaluated. Inscription affords a means of mitigating the significant class of vulnerability disclosures per year (e.g., it claimed the most web attacks that target unpatched, legacy Flash VMs and their CVEs of any application in 2016 [13]), and a rapidly evolving apps. Such legacy VMs, and the new and legacy Flash apps that version history. they run, continue to abound in a staggering number of web This rapid version churn inevitably means that hundreds clients and hosts today; their security issues routinely star in of distinct Flash Player versions are currently deployed by major annual threat reports and exploit kits worldwide. Through two complementary binary transformation approaches based on end-users worldwide, each with its own vulnerabilities and in-lined reference monitoring, it is shown that many of these idiosyncrasies [35, 33]. Studies estimate that nearly 62% of exploits can be thwarted by a third-party principal (e.g., web page Internet Explorer users, 37% of Edge users, and 32% of Safari publisher, ad network, network firewall, or web browser) lacking and Firefox users are running outdated Flash Player versions the ability to universally patch all end-user VMs—write-access that leave them unprotected against well-known attacks [54].