US20120131678A1 - System, method and computer program product for virtual patching - Google Patents
System, method and computer program product for virtual patching Download PDFInfo
- Publication number
- US20120131678A1 US20120131678A1 US13/362,225 US201213362225A US2012131678A1 US 20120131678 A1 US20120131678 A1 US 20120131678A1 US 201213362225 A US201213362225 A US 201213362225A US 2012131678 A1 US2012131678 A1 US 2012131678A1
- Authority
- US
- United States
- Prior art keywords
- vulnerability
- call
- program product
- root cause
- computer program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000004590 computer program Methods 0.000 title claims abstract description 11
- 238000004883 computer application Methods 0.000 claims abstract description 13
- 239000013598 vector Substances 0.000 claims description 23
- 230000006870 function Effects 0.000 description 12
- 238000001514 detection method Methods 0.000 description 7
- 230000002265 prevention Effects 0.000 description 7
- 238000001914 filtration Methods 0.000 description 5
- 230000004069 differentiation Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- UPMXNNIRAGDFEH-UHFFFAOYSA-N 3,5-dibromo-4-hydroxybenzonitrile Chemical compound OC1=C(Br)C=C(C#N)C=C1Br UPMXNNIRAGDFEH-UHFFFAOYSA-N 0.000 description 2
- 241000700605 Viruses Species 0.000 description 2
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Definitions
- the present invention relates to computer security software, and more particularly to patching security vulnerabilities.
- unwanted data such as viruses, worms, Trojan horses, spyware, etc. is constantly being developed by attackers to intrude and sometimes even destroy computer systems.
- the results of unwanted data has ranged from mild interference with a program, such as the display of an unwanted political message in a dialog box, to the complete destruction of data on a hard drive, and even the theft of personal information.
- Patching is a method by which software updates for security programs are provided to computer systems utilizing such security programs, in order to protect the computer systems against newly discovered vulnerabilities.
- patches generally include executable programs (or data that may be used by installation programs) that are run on the computer systems utilizing the security programs.
- patching can become quite cumbersome.
- patching generally requires that all computer systems running the associated security program individually execute, or install, the patch. This results in an extremely time-consuming process.
- a patch must be created to protect the vulnerability.
- the patch must be tested to make sure that it, in fact, protects the vulnerability.
- the patch must be distributed to all pertinent computer systems which must each install the patch individually and then reboot in order for the patch to operate.
- the patching process may require the distribution and execution of a single patch to thousands of computers. In view of the vast number of patches that are created almost daily, this process becomes very inefficient. In addition, a network of computers, such as within a company or even over the Internet, will most likely be at risk for quite some time since full protection against the vulnerability is not provided until all computer systems install the patch. Furthermore, patches generally build on one another such that a latest patch requires all previous patches to have been installed. This may cause problems in and of itself if users of computer systems are not diligent in installing all patches.
- intrusion prevention systems have been created that employ behavioral blocking techniques. In these types of systems, continuous patching is not needed since signatures for matching specific processes and data are not used. However, since intrusion prevention systems only rely on recognized behaviors, protection is limited such that many vulnerabilities go unprotected.
- a system, method, and computer program product are provided for virtual patching. Initially, information associated with at least one vulnerability of a computer application is collected. Further, at least one host interface is identified that is capable of being used to access the vulnerability. In use, data sent to the at least one host interface is analyzed to determine whether the data is unwanted, based on the information.
- the information may be collected from a software patch.
- an event may be initiated if the data is determined to be unwanted. Such event may include preventing the data from accessing the at least one host interface.
- the event may include creating a software exception.
- the event may include suspending a thread executing the data. Further, the event may include terminating execution of a process associated with the data.
- the information may include public information.
- the information may be collected utilizing black box testing.
- the information may also be collected utilizing binary differentiation.
- the at least one host interface may be identified utilizing a debugger.
- the at least one host interface may be identified utilizing a static analysis. Still yet, a closest host interface may be identified and only data sent to the closest host interface may be analyzed, when a plurality of the host interfaces is identified.
- the collecting, identifying and analyzing may be capable of being disabled. Furthermore, the collecting may include filtering the information and classifying the information. Specifically, the filtering may optionally include identifying a vulnerability name, severity level and/or affected platform. As another option, the identifying may include reproducing the vulnerability and determining a root cause of the vulnerability. In addition, a detection algorithm may also be created for utilization in detecting subsequent unwanted data.
- FIG. 1 illustrates a network architecture, in accordance with one embodiment.
- FIG. 2 shows a representative hardware environment that may be associated with the data server computers arid/or end user computers of FIG. 1 , in accordance with one embodiment.
- FIG. 3 shows a method for virtual patching, in accordance with one embodiment.
- FIG. 4 shows a method for virtual patching, in accordance with another embodiment.
- FIG. 1 illustrates a network architecture 100 , in accordance with one embodiment.
- a plurality of networks 102 is provided.
- the networks 102 may each take any form including, but not limited to a local area network (LAN), a wireless network, a wide area network (WAN) such as the Internet, etc.
- LAN local area network
- WAN wide area network
- Coupled to the networks 102 are data server computers 104 which are capable of communicating over the networks 102 . Also coupled to the networks 102 and the data server computers 104 is a plurality of end user computers 106 . Such client computers 106 may each include a desktop computer, lap-top computer, mobile phone, hand-held computer, any component of a computer, and/or any other type of logic. In order to facilitate communication among the networks 102 , at least one gateway or router 108 is optionally coupled therebetween.
- any of the foregoing computers in the present network architecture 100 may be equipped with various security system features.
- the various data server computers 104 and/or end user computers 106 may be equipped with security system hardware and/or software for protecting the various computers on any of the networks 102 against unwanted data. More information regarding optional functionality and optional architectural components associated with such feature will now be set forth for illustrative purposes.
- FIG. 2 shows a representative hardware environment that may be associated with the data server computers 104 and/or end user computers 106 of FIG. 1 , in accordance with one embodiment.
- Such figure illustrates a typical hardware configuration of a workstation in accordance with one embodiment having a central processing unit 210 , such as a microprocessor, and a number of other units interconnected via a system bus 212 .
- a central processing unit 210 such as a microprocessor
- the workstation shown in FIG. 2 includes a Random Access Memory (RAM) 214 , Read Only Memory (ROM) 216 , an I/O adapter 218 for connecting peripheral devices such as disk storage units 220 to the bus 212 , a user interface adapter 222 for connecting a keyboard 224 , a mouse 226 , a speaker 228 , a microphone 232 , and/or other user interface devices such as a touch screen (not shown) to the bus 212 , communication adapter 234 for connecting the workstation to a communication network 235 (e.g., a data processing network) and a display adapter 236 for connecting the bus 212 to a display device 238 .
- a communication network 235 e.g., a data processing network
- display adapter 236 for connecting the bus 212 to a display device 238 .
- the workstation may have resident thereon any desired operating system. It will be appreciated that an embodiment may also be implemented on platforms and operating systems other than those mentioned.
- One embodiment may be written using JAVA, C, and/or C++ language, or other programming languages, along with an object oriented programming methodology.
- Object oriented programming (OOP) has become increasingly used to develop complex applications.
- FIG. 3 shows a method 300 for virtual patching, in accordance with one embodiment.
- the present method 300 may be implemented in the context of the architecture and environment of FIGS. 1 and/or 2 . Of course, however, the method 300 may be carried out in any desired environment.
- information associated with at least one vulnerability of a computer application is collected, as shown in operation 302 .
- the information may be publicly available information collected from public resources (e.g. MICROSOFT Monthly Security announcements, full-disclosure mailing lists, etc.) that describe the vulnerability (e.g. name, source, process utilized for exploitation, code path/function utilized for exploitation, severity level, affected platform(s), vulnerable products, external references to exploit code, documentation on the computer application, etc.).
- public resources e.g. MICROSOFT Monthly Security announcements, full-disclosure mailing lists, etc.
- the vulnerability e.g. name, source, process utilized for exploitation, code path/function utilized for exploitation, severity level, affected platform(s), vulnerable products, external references to exploit code, documentation on the computer application, etc.
- the information may be collected from a software patch associated with a vulnerability in a computer application.
- the information may be collected from the software patch utilizing black box testing.
- Black box testing may be utilized when the known information associated with the vulnerability includes a known exploit and a known result associated with the exploit.
- black box testing may be used for collecting information about a vulnerability when there is no known information about the inner-workings of the vulnerability.
- the known exploit may be researched utilizing debugging methodologies in order to collect detailed information about the vulnerability.
- the IDA PRO DISASSEMBLER and DEBUGGER made by DATARESCUE, Inc. may be utilized for collecting the information by way of a debugger as described hereinabove.
- binary differentiation may be utilized for collecting the vulnerability information from the software patch.
- Binary differentiation includes the enumeration of all functions within two files: the first file being the software patch and the second file being the latest version of the computer application without the patch.
- the latest version of the computer application may include the original computer application with all patches except the present patch from which information is being collected.
- the vulnerability information collected in operation 302 may further include filtering the information and/or classifying the information. Examples of such filtering and classifying will be described in more detail with respect to FIG. 4 .
- the host interface may be any type of function or interface that serves as a gateway or access point to the vulnerability (e.g. vulnerable code in the computer application, etc.).
- the host interface may be identified utilizing a debugger. For example, a break may be placed in vulnerable code identified in the information collected in operation 302 . Then, the code may be traced to identify the location in the code creating the vulnerability.
- the host interface may be identified utilizing a static analysis to find the execution flow in the vulnerable application. For example, if the vulnerability is located within an executable file, the executable file may be run for identifying error messages, creating error log files, etc. In addition, if no exploit is known in association with the vulnerability, a debugger may be utilized for locating all code paths associated with functions leading to the vulnerable code.
- any method may be utilized which is capable of identifying at least one host interface for accessing the vulnerability.
- a plurality of host interfaces may be identified.
- a closest host interface may be identified in operation 304 .
- the closest host interface may be identified according to any number of criteria, such as a shortest code path to the vulnerability, a code path previously utilized for exploiting the vulnerability, etc.
- operation 304 may additionally include reproducing the vulnerability and/or determining a root cause of the vulnerability. Examples of reproducing the vulnerability and determining a root cause of the vulnerability will be described in more detail during reference to FIG. 4 .
- a vector of the vulnerability may be recorded.
- the vector may be in the same form as the object in which the vulnerability is located. For example, if the vulnerability is in the header of an image file, the vector may be a file. Further, if the vulnerability is in a network service, the vector may be a network, etc. Table 1 illustrates various data the vector may include.
- the root cause determined with respect to operation 304 may also be utilized for creating a detection algorithm for detecting subsequent unwanted data. Such detection algorithm will be described in further detail during reference to FIG. 4 .
- data sent to the interface is analyzed in order to determine whether the data is unwanted, as shown in operation 306 .
- the unwanted data may include any malicious data, such as viruses, worms, Trojan horses, spyware, etc., and/or any other data and/or code that is unwanted.
- it may be determined whether the data is unwanted For example, the data may be determined to be unwanted if it attempts to access the vulnerable code.
- a plurality of host interfaces are identified in operation 304 , as described above, only the closest host interface may be analyzed in operation 306 .
- any number of the host interfaces may be analyzed in operation 306 , as desired.
- the collecting, identifying and analyzing of operations 302 - 306 may be disabled at any time.
- an event may be initiated. Such event may include, but is not limited to preventing the data from accessing the at least one host interface, creating a software exception, suspending a thread executing the data, terminating execution of a process associated with the data, and/or any other type of desired event.
- the information collected in operations 302 - 306 may be utilized for implementing a system that intercepts calls made to the interface identified in operation 304 and further invokes a function to validate such calls each time they are made.
- a system may be included in any intrusion prevention or detection system.
- the system may report attempts to exploit vulnerabilities. In this way, it is not necessary for a patch to be distributed and installed at each computer utilizing the software application, while up-to-date protection may still be provided that efficiently addresses newfound vulnerabilities.
- physical patching may be used in combination with the aforementioned virtual patching, as desired.
- FIG. 4 shows a method for virtual patching, in accordance with another embodiment.
- the present method 400 may be implemented in the context of the architecture and environment of FIGS. 1-3 . Of course, however, the method 400 may be carried out in any desired environment.
- information associated with at least one vulnerability of a computer application may be collected, as shown in operation 402 .
- Such information may be collected in any manner, such as, for example, that described with respect to operation 302 of FIG. 3 .
- Information associated with the vulnerability may then be filtered and classified, as in operation 404 .
- Filtering the information collected in operation 404 may include identifying a vulnerability name, severity level and/or affected platform of the vulnerability.
- any other such information associated with the information collection in operation 402 may be identified by way of a filter. In this way, only information pertinent to the vulnerability and/or the cause of the vulnerability is available after collection.
- the collected information of operation 402 may be utilized for classifying the vulnerability. Such classification may be made according to a severity of the vulnerability, vulnerable products, etc.
- At least one host interface that is capable of being used to access the vulnerability may then be identified, as indicated in operation 406 .
- Such host interface may be identified in any desired manner. One optional example may be that described with respect to operation 304 of FIG. 3 .
- the vulnerability may then be reproduced, as illustrated in operation 408 .
- such vulnerability may be reproduced utilizing a debugger, by simply executing an executable file leading to the vulnerability, or by any other mechanism capable of reproducing the vulnerability.
- a specific example of vulnerability reproduction may include installing the operating system version and/or product version related to the vulnerability, and utilizing the information collected in operation 402 for exploiting the vulnerability.
- a root cause analysis may then be carried out in order to determine the root cause of the vulnerability, as in operation 410 .
- a root cause of the vulnerability may be determined utilizing the identification of the vulnerable code, as described with respect to FIG. 3 .
- the root cause may be any function in code that provides access to a computer system.
- the root cause may be utilized in creating a detection algorithm, as in operation 412 .
- detection algorithm may include any type of signature or may simply include a blueprint for creating any such signature, for use with a desired system [e.g. Host Intrusion Prevention System (HIPS), Network Intrusion Prevention System (NIPS), etc.].
- HIPS Host Intrusion Prevention System
- NIPS Network Intrusion Prevention System
- all calls attempting to access the host interface may be intercepted and validated before being allowed to proceed via the host interface, as shown in operation 414 . This option may be included in any intrusion prevention or detection system. In addition, it may report attempts to exploit vulnerabilities.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
A system, method, and computer program product are provided for virtual patching. Initially, information associated with at least one vulnerability of a computer application is collected. Further, at least one host interface is identified that is capable of being used to access the vulnerability. In use, data sent to the at least one host interface is analyzed to determine whether the data is unwanted, based on the information.
Description
- The present invention relates to computer security software, and more particularly to patching security vulnerabilities.
- Due to the ever-increasing amounts of unwanted data computer systems must be protected against, software updates for security programs have become a growing necessity. Specifically, unwanted data such as viruses, worms, Trojan horses, spyware, etc. is constantly being developed by attackers to intrude and sometimes even destroy computer systems. For example, the results of unwanted data has ranged from mild interference with a program, such as the display of an unwanted political message in a dialog box, to the complete destruction of data on a hard drive, and even the theft of personal information.
- Many security programs have been created in order to provide the protection required by modern computer systems. For example, firewalls, intrusion detection software, scanners, etc. have been used alone and in combination in order to best guard computer vulnerabilities against all types of unwanted data. However, with increasing amounts of unwanted data constantly being developed by attackers to circumvent such security programs, continuous updates have become necessary for providing ample protection.
- One type of update commonly provided by manufacturers of security programs includes patching. Patching is a method by which software updates for security programs are provided to computer systems utilizing such security programs, in order to protect the computer systems against newly discovered vulnerabilities. These patches generally include executable programs (or data that may be used by installation programs) that are run on the computer systems utilizing the security programs.
- Due to the large number of updates needed to keep up with constantly discovered newfound computer system vulnerabilities, patching can become quite cumbersome. In particular, patching generally requires that all computer systems running the associated security program individually execute, or install, the patch. This results in an extremely time-consuming process. First, once a vulnerability is discovered, a patch must be created to protect the vulnerability. Then, the patch must be tested to make sure that it, in fact, protects the vulnerability. Finally, the patch must be distributed to all pertinent computer systems which must each install the patch individually and then reboot in order for the patch to operate.
- For large corporations utilizing security software, the patching process may require the distribution and execution of a single patch to thousands of computers. In view of the vast number of patches that are created almost daily, this process becomes very inefficient. In addition, a network of computers, such as within a company or even over the Internet, will most likely be at risk for quite some time since full protection against the vulnerability is not provided until all computer systems install the patch. Furthermore, patches generally build on one another such that a latest patch requires all previous patches to have been installed. This may cause problems in and of itself if users of computer systems are not diligent in installing all patches.
- To overcome the problems associated with patching, intrusion prevention systems have been created that employ behavioral blocking techniques. In these types of systems, continuous patching is not needed since signatures for matching specific processes and data are not used. However, since intrusion prevention systems only rely on recognized behaviors, protection is limited such that many vulnerabilities go unprotected.
- Due to the inefficiencies of the foregoing patching and intrusion prevention methods, a more efficient method is needed which is capable of addressing vulnerability issues more quickly and effectively. There is thus a need for overcoming these and/or other problems associated with the prior art.
- A system, method, and computer program product are provided for virtual patching. Initially, information associated with at least one vulnerability of a computer application is collected. Further, at least one host interface is identified that is capable of being used to access the vulnerability. In use, data sent to the at least one host interface is analyzed to determine whether the data is unwanted, based on the information.
- In one embodiment, the information may be collected from a software patch. In addition, an event may be initiated if the data is determined to be unwanted. Such event may include preventing the data from accessing the at least one host interface. Optionally, the event may include creating a software exception. As another option, the event may include suspending a thread executing the data. Further, the event may include terminating execution of a process associated with the data.
- In another embodiment, the information may include public information. As an option, the information may be collected utilizing black box testing. The information may also be collected utilizing binary differentiation. Additionally, the at least one host interface may be identified utilizing a debugger. In another aspect, the at least one host interface may be identified utilizing a static analysis. Still yet, a closest host interface may be identified and only data sent to the closest host interface may be analyzed, when a plurality of the host interfaces is identified.
- In yet another embodiment, the collecting, identifying and analyzing may be capable of being disabled. Furthermore, the collecting may include filtering the information and classifying the information. Specifically, the filtering may optionally include identifying a vulnerability name, severity level and/or affected platform. As another option, the identifying may include reproducing the vulnerability and determining a root cause of the vulnerability. In addition, a detection algorithm may also be created for utilization in detecting subsequent unwanted data.
-
FIG. 1 illustrates a network architecture, in accordance with one embodiment. -
FIG. 2 shows a representative hardware environment that may be associated with the data server computers arid/or end user computers ofFIG. 1 , in accordance with one embodiment. -
FIG. 3 shows a method for virtual patching, in accordance with one embodiment. -
FIG. 4 shows a method for virtual patching, in accordance with another embodiment. -
FIG. 1 illustrates a network architecture 100, in accordance with one embodiment. As shown, a plurality of networks 102 is provided. In the context of the present network architecture 100, the networks 102 may each take any form including, but not limited to a local area network (LAN), a wireless network, a wide area network (WAN) such as the Internet, etc. - Coupled to the networks 102 are data server computers 104 which are capable of communicating over the networks 102. Also coupled to the networks 102 and the data server computers 104 is a plurality of end user computers 106. Such client computers 106 may each include a desktop computer, lap-top computer, mobile phone, hand-held computer, any component of a computer, and/or any other type of logic. In order to facilitate communication among the networks 102, at least one gateway or router 108 is optionally coupled therebetween.
- It should be noted that any of the foregoing computers in the present network architecture 100, as well as any other unillustrated hardware and/or software, may be equipped with various security system features. For example, the various data server computers 104 and/or end user computers 106 may be equipped with security system hardware and/or software for protecting the various computers on any of the networks 102 against unwanted data. More information regarding optional functionality and optional architectural components associated with such feature will now be set forth for illustrative purposes.
-
FIG. 2 shows a representative hardware environment that may be associated with the data server computers 104 and/or end user computers 106 ofFIG. 1 , in accordance with one embodiment. Such figure illustrates a typical hardware configuration of a workstation in accordance with one embodiment having acentral processing unit 210, such as a microprocessor, and a number of other units interconnected via asystem bus 212. - The workstation shown in
FIG. 2 includes a Random Access Memory (RAM) 214, Read Only Memory (ROM) 216, an I/O adapter 218 for connecting peripheral devices such asdisk storage units 220 to thebus 212, auser interface adapter 222 for connecting akeyboard 224, amouse 226, aspeaker 228, amicrophone 232, and/or other user interface devices such as a touch screen (not shown) to thebus 212,communication adapter 234 for connecting the workstation to a communication network 235 (e.g., a data processing network) and adisplay adapter 236 for connecting thebus 212 to adisplay device 238. - The workstation may have resident thereon any desired operating system. It will be appreciated that an embodiment may also be implemented on platforms and operating systems other than those mentioned. One embodiment may be written using JAVA, C, and/or C++ language, or other programming languages, along with an object oriented programming methodology. Object oriented programming (OOP) has become increasingly used to develop complex applications.
- Our course, the various embodiments set forth herein may be implemented utilizing hardware, software, or any desired combination thereof. For that matter, any type of logic may be utilized which is capable of implementing the various functionality set forth herein.
-
FIG. 3 shows amethod 300 for virtual patching, in accordance with one embodiment. As an option, thepresent method 300 may be implemented in the context of the architecture and environment ofFIGS. 1 and/or 2. Of course, however, themethod 300 may be carried out in any desired environment. - Initially, information associated with at least one vulnerability of a computer application is collected, as shown in
operation 302. For example, the information may be publicly available information collected from public resources (e.g. MICROSOFT Monthly Security announcements, full-disclosure mailing lists, etc.) that describe the vulnerability (e.g. name, source, process utilized for exploitation, code path/function utilized for exploitation, severity level, affected platform(s), vulnerable products, external references to exploit code, documentation on the computer application, etc.). - As another option, the information may be collected from a software patch associated with a vulnerability in a computer application. In one example, the information may be collected from the software patch utilizing black box testing. Black box testing may be utilized when the known information associated with the vulnerability includes a known exploit and a known result associated with the exploit. In general, black box testing may be used for collecting information about a vulnerability when there is no known information about the inner-workings of the vulnerability. In such a situation, the known exploit may be researched utilizing debugging methodologies in order to collect detailed information about the vulnerability. Just by way of example, the IDA PRO DISASSEMBLER and DEBUGGER made by DATARESCUE, Inc. may be utilized for collecting the information by way of a debugger as described hereinabove.
- In another example, binary differentiation may be utilized for collecting the vulnerability information from the software patch. Binary differentiation includes the enumeration of all functions within two files: the first file being the software patch and the second file being the latest version of the computer application without the patch. For example, the latest version of the computer application may include the original computer application with all patches except the present patch from which information is being collected.
- Once the functions for each are enumerated, two code trees are created such that one code tree is created for the enumerated functions of each file. The two code trees are then compared so that the content of each function in one tree is matched with content of a function in the other tree. In this way, the functions of each file can be mapped and only information concerning functions that have changed (or are new) in the patched file are collected. Just by way of example, such binary differentiation may be accomplished utilizing the SABRE BinDiff product by SABRE Security.
- As an option, the vulnerability information collected in
operation 302 may further include filtering the information and/or classifying the information. Examples of such filtering and classifying will be described in more detail with respect toFIG. 4 . - After the information is collected in
operation 302, at least one host interface that is capable of being used to access the vulnerability is identified, as shown inoperation 304. The host interface may be any type of function or interface that serves as a gateway or access point to the vulnerability (e.g. vulnerable code in the computer application, etc.). As an option, the host interface may be identified utilizing a debugger. For example, a break may be placed in vulnerable code identified in the information collected inoperation 302. Then, the code may be traced to identify the location in the code creating the vulnerability. - As another option, the host interface may be identified utilizing a static analysis to find the execution flow in the vulnerable application. For example, if the vulnerability is located within an executable file, the executable file may be run for identifying error messages, creating error log files, etc. In addition, if no exploit is known in association with the vulnerability, a debugger may be utilized for locating all code paths associated with functions leading to the vulnerable code.
- Of course, it should be noted that any method may be utilized which is capable of identifying at least one host interface for accessing the vulnerability. In some embodiments, a plurality of host interfaces may be identified. In such a case, a closest host interface may be identified in
operation 304. The closest host interface may be identified according to any number of criteria, such as a shortest code path to the vulnerability, a code path previously utilized for exploiting the vulnerability, etc. - Furthermore,
operation 304 may additionally include reproducing the vulnerability and/or determining a root cause of the vulnerability. Examples of reproducing the vulnerability and determining a root cause of the vulnerability will be described in more detail during reference toFIG. 4 . Once the root cause is determined, a vector of the vulnerability may be recorded. Optionally, the vector may be in the same form as the object in which the vulnerability is located. For example, if the vulnerability is in the header of an image file, the vector may be a file. Further, if the vulnerability is in a network service, the vector may be a network, etc. Table 1 illustrates various data the vector may include. -
TABLE 1 Location of the vulnerable code Name of executable Short description of location in vulnerable product in which vulnerable executable is implemented Possible input vectors that are capable of exploiting the vulnerable code. Root cause information - The root cause determined with respect to
operation 304 may also be utilized for creating a detection algorithm for detecting subsequent unwanted data. Such detection algorithm will be described in further detail during reference toFIG. 4 . After at least one host interface is identified inoperation 304, data sent to the interface is analyzed in order to determine whether the data is unwanted, as shown inoperation 306. In the context of the present description, the unwanted data may include any malicious data, such as viruses, worms, Trojan horses, spyware, etc., and/or any other data and/or code that is unwanted. With the knowledge of the location of the vulnerable code fromoperations - In an embodiment where a plurality of host interfaces are identified in
operation 304, as described above, only the closest host interface may be analyzed inoperation 306. Of course, any number of the host interfaces may be analyzed inoperation 306, as desired. - As an option, the collecting, identifying and analyzing of operations 302-306 may be disabled at any time. In addition, if it is determined in
operation 306 that the data is unwanted, an event may be initiated. Such event may include, but is not limited to preventing the data from accessing the at least one host interface, creating a software exception, suspending a thread executing the data, terminating execution of a process associated with the data, and/or any other type of desired event. - Furthermore, the information collected in operations 302-306 may be utilized for implementing a system that intercepts calls made to the interface identified in
operation 304 and further invokes a function to validate such calls each time they are made. Such a system may be included in any intrusion prevention or detection system. In addition, the system may report attempts to exploit vulnerabilities. In this way, it is not necessary for a patch to be distributed and installed at each computer utilizing the software application, while up-to-date protection may still be provided that efficiently addresses newfound vulnerabilities. Of course, physical patching may be used in combination with the aforementioned virtual patching, as desired. - More illustrative information will now be set forth regarding various optional architectures and features with which the foregoing
method 300 may or may not be implemented, per the desires of the user. It should be strongly noted that the following information is set forth for illustrative purposes and should not be construed as limiting in any manner. Any of the following features may be optionally incorporated with or without the exclusion of other features described. -
FIG. 4 shows a method for virtual patching, in accordance with another embodiment. As an option, thepresent method 400 may be implemented in the context of the architecture and environment ofFIGS. 1-3 . Of course, however, themethod 400 may be carried out in any desired environment. - Initially, information associated with at least one vulnerability of a computer application may be collected, as shown in
operation 402. Such information may be collected in any manner, such as, for example, that described with respect tooperation 302 ofFIG. 3 . Information associated with the vulnerability may then be filtered and classified, as inoperation 404. - Filtering the information collected in
operation 404 may include identifying a vulnerability name, severity level and/or affected platform of the vulnerability. Of course, any other such information associated with the information collection inoperation 402 may be identified by way of a filter. In this way, only information pertinent to the vulnerability and/or the cause of the vulnerability is available after collection. As another option, the collected information ofoperation 402 may be utilized for classifying the vulnerability. Such classification may be made according to a severity of the vulnerability, vulnerable products, etc. - At least one host interface that is capable of being used to access the vulnerability may then be identified, as indicated in
operation 406. Such host interface may be identified in any desired manner. One optional example may be that described with respect tooperation 304 ofFIG. 3 . - The vulnerability may then be reproduced, as illustrated in
operation 408. As described hereinabove, such vulnerability may be reproduced utilizing a debugger, by simply executing an executable file leading to the vulnerability, or by any other mechanism capable of reproducing the vulnerability. A specific example of vulnerability reproduction may include installing the operating system version and/or product version related to the vulnerability, and utilizing the information collected inoperation 402 for exploiting the vulnerability. - A root cause analysis may then be carried out in order to determine the root cause of the vulnerability, as in
operation 410. A root cause of the vulnerability may be determined utilizing the identification of the vulnerable code, as described with respect toFIG. 3 . Just by way of example, the root cause may be any function in code that provides access to a computer system. - Then, the root cause may be utilized in creating a detection algorithm, as in
operation 412. For example, such detection algorithm may include any type of signature or may simply include a blueprint for creating any such signature, for use with a desired system [e.g. Host Intrusion Prevention System (HIPS), Network Intrusion Prevention System (NIPS), etc.]. Finally, as yet another option, all calls attempting to access the host interface may be intercepted and validated before being allowed to proceed via the host interface, as shown inoperation 414. This option may be included in any intrusion prevention or detection system. In addition, it may report attempts to exploit vulnerabilities. - Again, it is not necessary for a patch to be distributed and installed at each computer utilizing the software application, since the vulnerability is not required to be fixed in order to protect the computer system. Instead, known vulnerabilities are utilized for validating calls made to the vulnerable code. Therefore, up-to-date protection is provided which efficiently addresses newfound vulnerabilities.
- While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. For example, any of the network elements may employ any of the desired functionality set forth hereinabove. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Claims (21)
1-21. (canceled)
22. A method, comprising:
identifying a host interface that is capable of being used to access a vulnerability of a computer application;
recording a vector associated with a root cause of the vulnerability;
intercepting a call attempting to access the host interface; and
validating the call based on the root cause.
23. The method of claim 22 , further comprising creating a software exception if data associated with the call is unwanted.
24. The method of claim 22 , further comprising suspending a thread if data associated with the call is unwanted.
25. The method of claim 22 , further comprising terminating execution of a process associated with the call.
26. The method of claim 22 , wherein the vector comprises a location of the vulnerability.
27. The method of claim 22 , wherein the vector comprises input vectors capable of exploiting the vulnerability.
28. The method of claim 22 , wherein the vector comprises information associated with the root cause.
29. The method of claim 22 , wherein the vector is recorded in a same form as an object in which the vulnerability is located.
30. A computer program product embodied on a non-transitory computer readable medium for performing operations, the operations comprising:
identifying a host interface that is capable of being used to access a vulnerability of a computer application;
recording a vector associated with a root cause of the vulnerability;
intercepting a call attempting to access the host interface; and
validating the call based on the root cause.
31. The computer program product of claim 30 , wherein the operations further comprise creating a software exception if data associated with the call is unwanted.
32. The computer program product of claim 30 , wherein the operations further comprise suspending a thread if data associated with the call is unwanted.
33. The computer program product of claim 30 , wherein the operations further comprise terminating execution of a process associated with the call.
34. The computer program product of claim 30 , wherein the vector comprises a location of the vulnerability.
35. The computer program product of claim 30 , wherein the vector comprises input vectors capable of exploiting the vulnerability.
36. The computer program product of claim 30 , wherein the vector comprises information associated with the root cause.
37. The computer program product of claim 30 , wherein the vector is recorded in a same form as an object in which the vulnerability is located.
38. A system, comprising:
a processor configured for executing non-transitory instructions stored in a memory, wherein the system is configured for:
identifying a host interface that is capable of being used to access a vulnerability of a computer application;
recording a vector associated with a root cause of the vulnerability;
intercepting a call attempting to access the host interface; and
validating the call based on the root cause.
39. The system of claim 38 , wherein the vector comprises a location of the vulnerability.
40. The system of claim 38 , wherein the vector comprises input vectors capable of exploiting the vulnerability.
41. The system of claim 38 , wherein the vector comprises information associated with the root cause.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/362,225 US20120131678A1 (en) | 2005-08-01 | 2012-01-31 | System, method and computer program product for virtual patching |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/194,300 US8132164B1 (en) | 2005-08-01 | 2005-08-01 | System, method and computer program product for virtual patching |
US13/362,225 US20120131678A1 (en) | 2005-08-01 | 2012-01-31 | System, method and computer program product for virtual patching |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/194,300 Continuation US8132164B1 (en) | 2005-08-01 | 2005-08-01 | System, method and computer program product for virtual patching |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120131678A1 true US20120131678A1 (en) | 2012-05-24 |
Family
ID=45758063
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/194,300 Active 2029-02-22 US8132164B1 (en) | 2005-08-01 | 2005-08-01 | System, method and computer program product for virtual patching |
US13/362,225 Abandoned US20120131678A1 (en) | 2005-08-01 | 2012-01-31 | System, method and computer program product for virtual patching |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/194,300 Active 2029-02-22 US8132164B1 (en) | 2005-08-01 | 2005-08-01 | System, method and computer program product for virtual patching |
Country Status (1)
Country | Link |
---|---|
US (2) | US8132164B1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8572750B2 (en) * | 2011-09-30 | 2013-10-29 | International Business Machines Corporation | Web application exploit mitigation in an information technology environment |
EP3323042A4 (en) * | 2015-07-13 | 2019-02-27 | Narf Industries, Inc. | SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING THE USE OF WEAKNESSES WITH SYMBOLIC RESTRICTIONS |
US20210353542A1 (en) * | 2014-04-01 | 2021-11-18 | Tdl Innovations Llc | Methods and Compositions for Administering an Active Agent to the Pleura of a Patient |
CN115277067A (en) * | 2022-06-15 | 2022-11-01 | 广州理工学院 | Computer network information vulnerability detection method based on artificial fish swarm algorithm |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9032530B2 (en) * | 2012-09-28 | 2015-05-12 | International Business Machines Corporation | Correcting workflow security vulnerabilities via static analysis and virtual patching |
WO2018004523A1 (en) * | 2016-06-28 | 2018-01-04 | Siemens Aktiengesellschaft | Plc virtual patching and automated distribution of security context |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060156380A1 (en) * | 2005-01-07 | 2006-07-13 | Gladstone Philip J S | Methods and apparatus providing security to computer systems and networks |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5105456B2 (en) | 2000-05-30 | 2012-12-26 | 株式会社ホットリンク | Distributed monitoring system that provides knowledge services |
US20020070978A1 (en) | 2000-07-13 | 2002-06-13 | Clayton Wishoff | Dynamically configurable graphical user environment |
US20030056116A1 (en) * | 2001-05-18 | 2003-03-20 | Bunker Nelson Waldo | Reporter |
US7673137B2 (en) * | 2002-01-04 | 2010-03-02 | International Business Machines Corporation | System and method for the managed security control of processes on a computer system |
US8136155B2 (en) | 2003-04-01 | 2012-03-13 | Check Point Software Technologies, Inc. | Security system with methodology for interprocess communication control |
US7424706B2 (en) * | 2003-07-16 | 2008-09-09 | Microsoft Corporation | Automatic detection and patching of vulnerable files |
US7421734B2 (en) * | 2003-10-03 | 2008-09-02 | Verizon Services Corp. | Network firewall test methods and apparatus |
US7886348B2 (en) * | 2003-10-03 | 2011-02-08 | Verizon Services Corp. | Security management system for monitoring firewall operation |
US7627543B2 (en) * | 2003-11-27 | 2009-12-01 | Qinetiq Limited | Automated anomaly detection |
US20060031755A1 (en) | 2004-06-24 | 2006-02-09 | Avaya Technology Corp. | Sharing inking during multi-modal communication |
US20060179484A1 (en) | 2005-02-09 | 2006-08-10 | Scrimsher John P | Remediating effects of an undesired application |
US7409709B2 (en) * | 2005-02-14 | 2008-08-05 | Etsec, Inc. | Systems and methods for automatically reconfiguring a network device |
US7784034B1 (en) | 2005-12-21 | 2010-08-24 | Mcafee, Inc. | System, method and computer program product for hooking a COM interface |
-
2005
- 2005-08-01 US US11/194,300 patent/US8132164B1/en active Active
-
2012
- 2012-01-31 US US13/362,225 patent/US20120131678A1/en not_active Abandoned
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060156380A1 (en) * | 2005-01-07 | 2006-07-13 | Gladstone Philip J S | Methods and apparatus providing security to computer systems and networks |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8572750B2 (en) * | 2011-09-30 | 2013-10-29 | International Business Machines Corporation | Web application exploit mitigation in an information technology environment |
US20210353542A1 (en) * | 2014-04-01 | 2021-11-18 | Tdl Innovations Llc | Methods and Compositions for Administering an Active Agent to the Pleura of a Patient |
EP3323042A4 (en) * | 2015-07-13 | 2019-02-27 | Narf Industries, Inc. | SYSTEM AND METHOD FOR IDENTIFYING AND PREVENTING THE USE OF WEAKNESSES WITH SYMBOLIC RESTRICTIONS |
CN115277067A (en) * | 2022-06-15 | 2022-11-01 | 广州理工学院 | Computer network information vulnerability detection method based on artificial fish swarm algorithm |
Also Published As
Publication number | Publication date |
---|---|
US8132164B1 (en) | 2012-03-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3474176B1 (en) | System and method of detecting a malicious file | |
US8566943B2 (en) | Asynchronous processing of events for malware detection | |
US7620990B2 (en) | System and method for unpacking packed executables for malware evaluation | |
US8719935B2 (en) | Mitigating false positives in malware detection | |
US9292684B2 (en) | Systems and methods for security in computer systems | |
US6785820B1 (en) | System, method and computer program product for conditionally updating a security program | |
US8307435B1 (en) | Software object corruption detection | |
US8719924B1 (en) | Method and apparatus for detecting harmful software | |
US20230185921A1 (en) | Prioritizing vulnerabilities | |
US7584503B1 (en) | Federating trust in a heterogeneous network | |
US11288362B2 (en) | System and method for creating antivirus records for antivirus applications | |
US8782791B2 (en) | Computer virus detection systems and methods | |
US8578345B1 (en) | Malware detection efficacy by identifying installation and uninstallation scenarios | |
US11409862B2 (en) | Intrusion detection and prevention for unknown software vulnerabilities using live patching | |
US8959624B2 (en) | Executable download tracking system | |
US11157618B2 (en) | Context-based analysis of applications | |
US20120131678A1 (en) | System, method and computer program product for virtual patching | |
US7665139B1 (en) | Method and apparatus to detect and prevent malicious changes to tokens | |
US7533416B2 (en) | Framework for protection level monitoring, reporting, and notification | |
US8458794B1 (en) | System, method, and computer program product for determining whether a hook is associated with potentially unwanted activity | |
EP2306356B1 (en) | Asynchronous processing of events for malware detection | |
US7607173B1 (en) | Method and apparatus for preventing rootkit installation | |
US10880316B2 (en) | Method and system for determining initial execution of an attack | |
US20110197253A1 (en) | Method and System of Responding to Buffer Overflow Vulnerabilities | |
Grizzard et al. | Re-establishing trust in compromised systems: recovering from rootkits that trojan the system call table |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |