skip to main content
10.1145/3372297.3420014acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

LPET -- Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior

Published:02 November 2020Publication History

ABSTRACT

Local Privilege Escalation (LPE) is a common attack vector used by attackers to gain higher-level permissions. In this poster, we present a system called LPET to mine LPE vulnerabilities of third-party software in MS-Windows. Our insight is that the LPE is often caused by the interactions between high-privilege processes and user-controllable files. The interactions include creating a file, starting a process and others. Based on this observation, LPET first monitors software behaviors and constructs a directed interaction graph to abstract entities, such as files and processes, and their interactions. Then LPET analyzes exploiting paths from the graph by extracting user-controllable entities and checking their privileges. Finally, LPET verifies the exploiting paths using replacement or hijacking attacks. In the preliminary experiments, LPET found vulnerabilities in various software. Moreover, we discovered a common weakness pattern that some components were executed by software with high privilege after being released in the user-controllable temporary directory during installation, update, and uninstallation. By replacing the components, attackers with low privilege can hijack the execution flow of software to execute their codes with high privilege. We found that a wide range of software suffers from this weakness pattern, including Cisco AnyConnect, Dropbox, Notepad++.

References

  1. 2016. PowerUp. [Online]. https://github.com/PowerShellEmpire/PowerTools/tree/master/PowerUp.Google ScholarGoogle Scholar
  2. 2020. PrivescCheck. [Online]. https://github.com/itm4n/PrivescCheck.Google ScholarGoogle Scholar
  3. MITRE ATT&CK. 2020. Privilege Escalation. [Online]. https://attack.mitre.org/TA0004/.Google ScholarGoogle Scholar
  4. Ryan James Berg, Larry Rose, John Peyton, John J Danahy, Robert Gottlieb, and Chris Rehbein. 2008. Method and system for detecting privilege escalation vulnerabilities in source code. US Patent 7,418,734.Google ScholarGoogle Scholar
  5. Jie Liu, Da He, Yifan Wang, Jianfeng Chen, and Zhihong Rao. 2020. Software Vulnerability Mining Based on the Human-Computer Coordination. In International Conference on Intelligent Human Systems Integration. Springer, 532--538.Google ScholarGoogle Scholar
  6. AS Markov, AA Fadin, and VL Tsirlov. 2016. Multilevel metamodel for heuristic search of vulnerabilities in the software source code. International Journal of Control Theory and Applications, Vol. 9, 30 (2016), 313--320.Google ScholarGoogle Scholar
  7. Microsoft. 2018. Event Tracing. [Online]. https://docs.microsoft.com/en-us/windows/desktop/ETW/event-tracing-portal.Google ScholarGoogle Scholar
  8. Tielei Wang, Tao Wei, Guofei Gu, and Wei Zou. 2010. TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection. In 2010 IEEE Symposium on Security and Privacy. IEEE, 497--512.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Eugene Yang. 2018. Fuzz testing & software composition analysis in software engineering. In 2018 International Symposium on VLSI Design, Automation and Test (VLSI-DAT). IEEE, 1--3.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. LPET -- Mining MS-Windows Software Privilege Escalation Vulnerabilities by Monitoring Interactive Behavior

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
      October 2020
      2180 pages
      ISBN:9781450370899
      DOI:10.1145/3372297

      Copyright © 2020 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 November 2020

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader