Transcript
Page 1: Rozzle : De- Cloaking  Internet Malware

Rozzle: De-Cloaking Internet Malware

Clemens Kolbitsch, Christian Seifert , Benjamin Livshits and Benjamin Zorn

Microsoft Research Technical Report

Presentation by David Ferreras

Page 2: Rozzle : De- Cloaking  Internet Malware

The Problem

• The browser is exposed to malicious content that affect millions of URLs using JavaScript

• Web-based malware tends to target a particular browser, often attacking specific versions of installed plugins. – Environment matching– Fingerprinting– Client-Side cloaking

Page 3: Rozzle : De- Cloaking  Internet Malware

The Problem

Page 4: Rozzle : De- Cloaking  Internet Malware

The Problem

Page 5: Rozzle : De- Cloaking  Internet Malware

The Solution Proposed

• Rozzle: Multi-execution JavaScript implementation– execute both possibilities whenever it encounters

control flow branching that is dependent on the environment

Page 6: Rozzle : De- Cloaking  Internet Malware

The Solution Proposed

Page 7: Rozzle : De- Cloaking  Internet Malware

The Solution Proposed (Details)

• Symbolic Values: All environment-specific values start out as symbolic in Rozzle

• Branching on symbolic values • Looping on symbolic values• Creates a heap of values

Page 8: Rozzle : De- Cloaking  Internet Malware

Results

Page 9: Rozzle : De- Cloaking  Internet Malware

Limitations

• Server-side cloaking• Breaking existing code• Identifying that Rozzle is enabled could be

used construct denial-of service attack on Rozzle-enabled browsers.

Page 10: Rozzle : De- Cloaking  Internet Malware

Any questions?


Recommended