Inscription: Thwarting ActionScript Web Attacks from Within


Sridhar M., Mohanty A., YILMAZ F., Tendulkar V., Hamlen K. W.

17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, United States Of America, 31 July - 03 August 2018, pp.504-515 identifier

  • Publication Type: Conference Paper / Full Text
  • Doi Number: 10.1109/trustcom/bigdatase.2018.00078
  • City: New York
  • Country: United States Of America
  • Page Numbers: pp.504-515
  • Keywords: ActionScript language, Adobe Flash, binary code transformation, in lined reference monitoring, Virtual Machines, Vulnerabilities

Abstract

© 2018 IEEE.The design and implementation of Inscription, the first fully automated Adobe Flash binary code transformation system that can guard major Flash vulnerability categories without modifying vulnerable Flash VMs, is presented and evaluated. Inscription affords a means of mitigating the significant class of web attacks that target unpatched, legacy Flash VMs and their apps. Such legacy VMs, and the new and legacy Flash apps that they run, continue to abound in a staggering number of web clients and hosts today; their security issues routinely star in major annual threat reports and exploit kits worldwide. Through two complementary binary transformation approaches based on in-lined reference monitoring, it is shown that many of these exploits can be thwarted by a third-party principal (e.g., web page publisher, ad network, network firewall, or web browser) lacking the ability to universally patch all end-user VMs - write-access to the untrusted Flash apps (prior to execution) suffices. Detailed case-studies describing proof-of-concept exploits and mitigations for five major vulnerability categories are reported.