Back to Search Start Over

ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs.

Authors :
Liu, Yang
Xu, Zisen
Fan, Ming
Hao, Yu
Chen, Kai
Chen, Hao
Cai, Yan
Yang, Zijiang
Liu, Ting
Source :
IEEE Transactions on Reliability. Jun2022, Vol. 71 Issue 2, p1174-1188. 15p.
Publication Year :
2022

Abstract

Concurrent programs with multiple threads executing in parallel are widely used to unleash the power of multicore computing systems. Owing to their complexity, a lot of research focuses on testing and debugging concurrent programs. Besides correctness, we find that security can also be compromised by concurrency. In this article, we present concurrent program spectre (ConcSpectre), a new security threat that hides malware in nondeterministic thread interleavings. To demonstrate such threat, we have developed a stealth malware technique called concurrent logic bomb by partitioning a piece of malicious code and injecting its components separately into a concurrent program. The malicious behavior can be triggered by certain thread interleavings that rarely happen (e.g., $< $ 1%) under a normal execution environment. However, with a new technique called controllable probabilistic activation, we can activate such ConcSpectre malware with a very high probability (e.g., $>$ 90%) by remotely disturbing thread scheduling. In the evaluation, more than 1000 ConcSpectre samples are generated, which bypassed most of the antivirus engines in VirusTotal and four well-known online dynamic malware analysis systems. We also demonstrate how to remotely trigger a ConcSpectre sample on a web server and control its activation probability. Our work shows an urgent need for new malware analysis methods for concurrent programs. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00189529
Volume :
71
Issue :
2
Database :
Academic Search Index
Journal :
IEEE Transactions on Reliability
Publication Type :
Academic Journal
Accession number :
157258543
Full Text :
https://doi.org/10.1109/TR.2022.3162694