SoK: How Not to Architect Your Next-Generation TEE Malware?

10/13/2022
by   Kubilay Ahmet Küçük, et al.
0

Besides Intel's SGX technology, there are long-running discussions on how trusted computing technologies can be used to cloak malware. Past research showed example methods of malicious activities utilising Flicker, Trusted Platform Module, and recently integrating with enclaves. We observe two ambiguous methodologies of malware development being associated with SGX, and it is crucial to systematise their details. One methodology is to use the core SGX ecosystem to cloak malware; potentially affecting a large number of systems. The second methodology is to create a custom enclave not adhering to base assumptions of SGX, creating a demonstration code of malware behaviour with these incorrect assumptions; remaining local without any impact. We examine what malware aims to do in real-world scenarios and state-of-art techniques in malware evasion. We present multiple limitations of maintaining the SGX-assisted malware and evading it from anti-malware mechanisms. The limitations make SGX enclaves a poor choice for achieving a successful malware campaign. We systematise twelve misconceptions (myths) outlining how an overfit-malware using SGX weakens malware's existing abilities. We find the differences by comparing SGX assistance for malware with non-SGX malware (i.e., malware in the wild in our paper). We conclude that the use of hardware enclaves does not increase the preexisting attack surface, enables no new infection vector, and does not contribute any new methods to the stealthiness of malware.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/07/2021

Comparative Review of Malware Analysis Methodologies

To fight against the evolution of malware and its development, the speci...
research
04/04/2018

Developing a K-ary malware using Blockchain

Cyberattacks are nowadays moving rapidly. They are customized, multi-vec...
research
01/17/2019

Easy to Fool? Testing the Anti-evasion Capabilities of PDF Malware Scanners

Malware scanners try to protect users from opening malicious documents b...
research
03/19/2016

A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions

As our professional, social, and financial existences become increasingl...
research
08/26/2019

Modeling infection methods of computer malware in the presence of vaccinations using epidemiological models: An analysis of real-world data

Computer malware and biological pathogens often use similar mechanisms o...
research
07/27/2019

Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge

Malware writers frequently try to hide the activities of their agents wi...
research
03/08/2018

Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate

Recent measurements of the Windows code-signing certificate ecosystem ha...

Please sign up or login with your details

Forgot password? Click here to reset