K-depth mimicry attack to secretly embed shellcode into PDF files

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

This paper revisits the shellcode embedding problem for PDF files. We found that a popularly used shellcode embedding technique called reverse mimicry attack has not been shown to be effective against well-trained state-of-the-art detectors. To overcome the limitation of the reverse mimicry method against existing shellcode detectors, we extend the idea of reverse mimicry attack to a more generalized one by applying the k-depth mimicry method to PDF files. We implement a proof-of-concept tool for the k-depth mimicry attack and show its feasibility by generating shellcode-embedded PDF files to evade the best known shellcode detector (PDFrate) with three classifiers. The experimental results show that all tested classifiers failed to effectively detect the shellcode embedded by the k-depth mimicry method when k ≥ 20.

Original languageEnglish
Title of host publicationInformation Science and Applications 2017 - ICISA 2017
EditorsKuinam Kim, Nikolai Joukov
PublisherSpringer Verlag
Pages388-395
Number of pages8
ISBN (Print)9789811041532
DOIs
StatePublished - 2017
Event8th International Conference on Information Science and Applications, ICISA 2017 - Macau, China
Duration: 20 Mar 201723 Mar 2017

Publication series

NameLecture Notes in Electrical Engineering
Volume424
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference8th International Conference on Information Science and Applications, ICISA 2017
Country/TerritoryChina
City Macau
Period20/03/1723/03/17

Keywords

  • Malware
  • Mimicry attack
  • PDF
  • Security
  • Shellcode

Fingerprint

Dive into the research topics of 'K-depth mimicry attack to secretly embed shellcode into PDF files'. Together they form a unique fingerprint.

Cite this