skip to main content
10.1145/2076732.2076788acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

From prey to hunter: transforming legacy embedded devices into exploitation sensor grids

Published:05 December 2011Publication History

ABSTRACT

Our global communication infrastructures are powered by large numbers of legacy embedded devices. Recent advances in offensive technologies targeting embedded systems have shown that the stealthy exploitation of high-value embedded devices such as router and firewalls is indeed feasible. However, little to no host-based defensive technology is available to monitor and protect these devices, leaving large numbers of critical devices defenseless against exploitation. We devised a method of augmenting legacy embedded devices, like Cisco routers, with host-based defenses in order to create a stealthy, embedded sensor-grid capable of monitoring and capturing real-world attacks against the devices which constitute the bulk of the Internet substrate. Using a software mechanism which we call the Symbiote, a white-list based code modification detector is automatically injected in situ into Cisco IOS, producing a fully functional router firmware capable of detecting and capturing successful attacks against itself for analysis. Using the Symbiote-protected router as the main component, we designed a sensor system which requires no modification to existing hardware, fully preserves the functionality of the original firmware, and detects unauthorized modification of memory within 450 ms. We believe that it is feasible to use the techniques described in this paper to inject monitoring and defensive capability into existing routers to create an early attack warning system to protect the Internet substrate.

References

  1. kaiten.c IRC DDOS Bot. http://packetstormsecurity.nl/irc/kaiten.c.Google ScholarGoogle Scholar
  2. Microsoft Corporation, Kernel Patch Protection: Frequently Asked Questions. http://tinyurl.com/y7pss5y, 2006.Google ScholarGoogle Scholar
  3. The End of Your Internet: Malware for Home Routers, 2008. http://tinyurl.com/3d9yv9l.Google ScholarGoogle Scholar
  4. Network Bluepill. Dronebl.org, 2008. http://www.dronebl.org/blog/8.Google ScholarGoogle Scholar
  5. New worm can infect home modem/routers. APCMAG.com, 2009. http://apcmag.com/Content.aspx?id=3687.Google ScholarGoogle Scholar
  6. Hoi Chang and Mikhail J. Atallah. Protecting software code by guards. In Tomas Sander, editor, Digital Rights Management Workshop, volume 2320 of Lecture Notes in Computer Science, pages 160--175. Springer, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ang Cui, Jatin Kataria, and Salvatore J. Stolfo. Killing the myth of cisco ios diversity: Towards reliable, large-scale exploitation of cisco ios, 2011. 5th USENIX Workshop on Offensive Technologies. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ang Cui and Salvatore J. Stolfo. A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In Carrie Gates, Michael Franz, and John P. McDermott, editors, ACSAC, pages 97--106. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ang Cui and Savaltore J. Stolfo. Defending legacy embedded devices with software symbiotes. In Robin Sommer, Davide Balzarotti, and Gregor Maier, editors, RAID, volume 6961 of Lecture Notes in Computer Science. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Abdallah Ghourabi, Tarek Abbes, and Adel Bouhoula. Honeypot router for routing protocols protection. In Anas Abou El Kalam, Yves Deswarte, and Mahmoud Mostafa, editors, CRiSIS, pages 127--130. IEEE, 2009.Google ScholarGoogle Scholar
  11. Christopher Krügel, William K. Robertson, and Giovanni Vigna. Detecting kernel-level rootkits through binary analysis. In ACSAC, pages 91--100. IEEE Computer Society, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Felix "FX" Linder. Cisco Vulnerabilities. In In BlackHat USA, 2003.Google ScholarGoogle Scholar
  13. Felix "FX" Linder. Cisco IOS Router Exploitation. In In BlackHat USA, 2009.Google ScholarGoogle Scholar
  14. Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors. Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15--17, 2008. Proceedings, volume 5230 of Lecture Notes in Computer Science. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Michael Lynn. Cisco IOS Shellcode, 2005. In BlackHat USA.Google ScholarGoogle Scholar
  16. Sebastian Muniz. Killing the myth of Cisco IOS rootkits: DIK, 2008. In EUSecWest.Google ScholarGoogle Scholar
  17. Ryan Riley, Xuxian Jiang, and Dongyan Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In Lippmann et al. {14}, pages 1--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Dror-John Roecher and Michael Thumann. NAC Attack. In In BlackHat USA, 2007.Google ScholarGoogle Scholar
  19. Skywing. Subverting PatchGuard Version 2, 2008. Uninformed, Volume 6.Google ScholarGoogle Scholar
  20. Yingbo Song, Pratap V. Prahbu, and Salvatore J. Stolfo. Smashing the stack with hydra: The many heads of advanced shellcode polymorphism. In Defcon 17, 2009.Google ScholarGoogle Scholar
  21. Salvatore J. Stolfo, Issac Greenbaum, and Simha Sethumadhavan. Self-monitoring monitors. Technical Report cucs-026-09, Columbia University Computer Science Department, April 2009.Google ScholarGoogle Scholar
  22. Vikas R. Vasisht and Hsien-Hsin S. Lee. Shark: Architectural support for autonomic protection against stealth by rootkit exploits. In MICRO, pages 106--116. IEEE Computer Society, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Zhi Wang, Xuxian Jiang, Weidong Cui, and Xinyuan Wang. Countering persistent kernel rootkits through systematic hook discovery. In Lippmann et al. {14}, pages 21--38. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. From prey to hunter: transforming legacy embedded devices into exploitation sensor grids

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ACSAC '11: Proceedings of the 27th Annual Computer Security Applications Conference
              December 2011
              432 pages
              ISBN:9781450306720
              DOI:10.1145/2076732

              Copyright © 2011 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 5 December 2011

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate104of497submissions,21%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader