@inproceedings{cbe7701e47b54a69a77667f321c5442f,
title = "Update state tampering: A novel adversary post-compromise technique on cyber threats",
abstract = "With modern cyber threats, attackers should gain persistency in target systems to achieve attack objectives. Once an attacker{\textquoteright}s zero-day vulnerabilities on target systems are patched, the attacker may lose control over the system. However, systems remain vulnerable when an attacker manipulates the component resources on a Windows system. We found methods to generate invisible vulnerabilities on a victim{\textquoteright}s system. Our findings are as follows: first, we found ways to replace a component to an old vulnerable version while maintaining the current update records; second, we found that the Windows system does not recognize the replaced components. We define the first issue as a package-component mismatch and the second issue as a blind spot issue on the Windows update management. They have been identified on all version of Vista and later, including desktop platforms and server platforms. Based on our findings, we reveal an Update State Tampering technique that can generate invisible security holes on target systems. We also offer corresponding countermeasures to detect and correct package-component mismatches. In this paper, we introduce the problems with the current Windows update management mechanism, the Update State Tampering technique from the attacker{\textquoteright}s point of view, and an Update State Check scheme that detects and recovers the package-component mismatches. We stress that our proposed Update State Check scheme should be deployed immediately in order to mitigate large-scale exploitation of the proposed technique.",
keywords = "Cyber threat, Post-compromise, Windows update",
author = "Kim, {Sung Jin} and Kim, {Byung Joon} and Kim, {Hyoung Chun} and Lee, {Dong Hoon}",
year = "2018",
month = jan,
day = "1",
doi = "10.1007/978-3-319-93411-2_7",
language = "English",
isbn = "9783319934105",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "141--161",
booktitle = "Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, DIMVA 2018, Proceedings",
note = "15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018 ; Conference date: 28-06-2018 Through 29-06-2018",
}