DocumentCode
724643
Title
The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching
Author
Nappa, Antonio ; Johnson, Richard ; Bilge, Leyla ; Caballero, Juan ; Dumitras, Tudor
Author_Institution
Univ. Politec. de Madrid, Madrid, Spain
fYear
2015
fDate
17-21 May 2015
Firstpage
692
Lastpage
708
Abstract
Vulnerability exploits remain an important mechanism for malware delivery, despite efforts to speed up the creation of patches and improvements in software updating mechanisms. Vulnerabilities in client applications (e.g., Browsers, multimedia players, document readers and editors) are often exploited in spear phishing attacks and are difficult to characterize using network vulnerability scanners. Analyzing their lifecycle requires observing the deployment of patches on hosts around the world. Using data collected over 5 years on 8.4 million hosts, available through Symantec´s WINE platform, we present the first systematic study of patch deployment in client-side vulnerabilities. We analyze the patch deployment process of 1,593 vulnerabilities from 10 popular client applications, and we identify several new threats presented by multiple installations of the same program and by shared libraries distributed with several applications. For the 80 vulnerabilities in our dataset that affect code shared by two applications, the time between patch releases in the different applications is up to 118 days (with a median of 11 days). Furthermore, as the patching rates differ considerably among applications, many hosts patch the vulnerability in one application but not in the other one. We demonstrate two novel attacks that enable exploitation by invoking old versions of applications that are used infrequently, but remain installed. We also find that the median fraction of vulnerable hosts patched when exploits are released is at most 14%. Finally, we show that the patching rate is affected by user-specific and application-specific factors, for example, hosts belonging to security analysts and applications with an automated updating mechanism have significantly lower median times to patch.
Keywords
invasive software; software reliability; Symantec WINE platform; application-specific factors; automated updating mechanism; malware delivery; network vulnerability scanners; shared code; software lifecycle analysis; software updating mechanisms; spear phishing attacks; user-specific factors; vulnerability patching; Databases; Delays; Libraries; Security; Sociology; Software; Statistics; client applications; patch deployment; shared code; software vulnerabilities; vulnerability exploits;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Privacy (SP), 2015 IEEE Symposium on
Conference_Location
San Jose, CA
ISSN
1081-6011
Type
conf
DOI
10.1109/SP.2015.48
Filename
7163055
Link To Document