Exorcist: automated differential analysis to detect compromises in closed-source software supply chains

The insertion of trojanised binaries into supply chains are a particularly subtle form of cyber-attack that require a multi-staged and complex deployment methodology to implement and execute. In the years preceding this research there has been a spike in closed-source software supply chain attacks u...

Volledige beschrijving

Bibliografische gegevens
Hoofdauteurs: Barr-Smith, F, Baker, R, Blazytko, T, Martinovic, I
Formaat: Conference item
Taal:English
Gepubliceerd in: Association for Computing Machinery 2022
_version_ 1826309642309861376
author Barr-Smith, F
Baker, R
Blazytko, T
Martinovic, I
author_facet Barr-Smith, F
Baker, R
Blazytko, T
Martinovic, I
author_sort Barr-Smith, F
collection OXFORD
description The insertion of trojanised binaries into supply chains are a particularly subtle form of cyber-attack that require a multi-staged and complex deployment methodology to implement and execute. In the years preceding this research there has been a spike in closed-source software supply chain attacks used to attack downstream clients or users of a company. To detect this attack type, we present an approach to detecting the insertion of malicious functionality in supply chains via differential analysis of binaries. This approach determines whether malicious functionality has been inserted in a particular build by looking for indicators of maliciousness. We accomplish this via automated comparison of a known benign build to successive potentially malicious versions. To substantiate this approach we present a system, Exorcist, that we have designed, developed and evaluated as capable of detecting trojanised binaries in Windows software supply chains. In evaluating this system we analyse 12 samples from high-profile APT attacks conducted via the software supply chain.
first_indexed 2024-03-07T07:38:48Z
format Conference item
id oxford-uuid:01189dc8-26bd-4bc5-9b20-70068c20c8f7
institution University of Oxford
language English
last_indexed 2024-03-07T07:38:48Z
publishDate 2022
publisher Association for Computing Machinery
record_format dspace
spelling oxford-uuid:01189dc8-26bd-4bc5-9b20-70068c20c8f72023-04-04T12:41:14ZExorcist: automated differential analysis to detect compromises in closed-source software supply chainsConference itemhttp://purl.org/coar/resource_type/c_5794uuid:01189dc8-26bd-4bc5-9b20-70068c20c8f7EnglishSymplectic ElementsAssociation for Computing Machinery2022Barr-Smith, FBaker, RBlazytko, TMartinovic, IThe insertion of trojanised binaries into supply chains are a particularly subtle form of cyber-attack that require a multi-staged and complex deployment methodology to implement and execute. In the years preceding this research there has been a spike in closed-source software supply chain attacks used to attack downstream clients or users of a company. To detect this attack type, we present an approach to detecting the insertion of malicious functionality in supply chains via differential analysis of binaries. This approach determines whether malicious functionality has been inserted in a particular build by looking for indicators of maliciousness. We accomplish this via automated comparison of a known benign build to successive potentially malicious versions. To substantiate this approach we present a system, Exorcist, that we have designed, developed and evaluated as capable of detecting trojanised binaries in Windows software supply chains. In evaluating this system we analyse 12 samples from high-profile APT attacks conducted via the software supply chain.
spellingShingle Barr-Smith, F
Baker, R
Blazytko, T
Martinovic, I
Exorcist: automated differential analysis to detect compromises in closed-source software supply chains
title Exorcist: automated differential analysis to detect compromises in closed-source software supply chains
title_full Exorcist: automated differential analysis to detect compromises in closed-source software supply chains
title_fullStr Exorcist: automated differential analysis to detect compromises in closed-source software supply chains
title_full_unstemmed Exorcist: automated differential analysis to detect compromises in closed-source software supply chains
title_short Exorcist: automated differential analysis to detect compromises in closed-source software supply chains
title_sort exorcist automated differential analysis to detect compromises in closed source software supply chains
work_keys_str_mv AT barrsmithf exorcistautomateddifferentialanalysistodetectcompromisesinclosedsourcesoftwaresupplychains
AT bakerr exorcistautomateddifferentialanalysistodetectcompromisesinclosedsourcesoftwaresupplychains
AT blazytkot exorcistautomateddifferentialanalysistodetectcompromisesinclosedsourcesoftwaresupplychains
AT martinovici exorcistautomateddifferentialanalysistodetectcompromisesinclosedsourcesoftwaresupplychains