Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Bytecode Jiu-Jitsu: Choking Interpreters to Force Execution of Malicious Bytecode

Автор: Black Hat

Загружено: 2025-01-28

Просмотров: 1069

Описание:

Code injection is a category of techniques that hides the behavior of malware by injecting malicious code into the memory of a legitimate process. However, most existing techniques rely on specific system APIs that are considered suspicious and often monitored by security products, which makes them easy to detect.

We introduce a novel code injection attack, Bytecode Jiu-Jitsu, that injects malicious bytecode into an interpreter. It works by dynamically replacing existing benign bytecode in the memory of an interpreter process and forcing the process to execute the new bytecode. This attack is covert because it does not need to call suspicious APIs for thread creation, executable memory allocation, or instruction pointer modification. The main challenges lie in reverse-engineering the locations and structures of bytecode and symbol tables (data structures that manage data referenced by bytecode) in memory, which depends on the specific implementation of the interpreter. This reverse engineering requires a prohibitive human effort, especially if the source code is unavailable.

Therefore, we propose an almost fully automatic technique for analyzing an interpreter binary to reveal the locations and structures and injecting arbitrary bytecode based on the analysis. The analysis allows our injection attack to be applied to even proprietary interpreters with minimal human effort.

In this talk, we first revisit different types of code injection techniques. Next, we explain the interpreter analysis technique and the Bytecode Jiu-Jitsu technique while showing its advantages so that the audience can obtain a blue belt. We then demonstrate that our attack can:
(1) apply to diverse real-world interpreters,
(2) evade detection by more than 80% of antivirus products on VirusTotal and state-of-the-art memory forensics tools,
(3) disturb behavioral analysis with sandboxes and EDRs as well as manual analysis by experienced malware analysts.

Finally, we will release our tool that Red Teamers and security researchers can use for research and evaluation.

By:
Toshinori Usui | Research Scientist, NTT Security Holdings Corporation
Yuto Otsuki | Senior Researcher, NTT Security Holdings Corporation
Ryo Kubota | Researcher, NTT Security Holdings Corporation
Yuhei Kawakoya | Distinguished Researcher, NTT Security Holdings Corporation
Makoto Iwamura | Distinguished Researcher, NTT Security Holdings Corporation
Kanta Matsuura | Professor, Institute of Industrial Science, The University of Tokyo

Full Abstract and Presentation Materials:
https://www.blackhat.com/us-24/briefi...

Bytecode Jiu-Jitsu: Choking Interpreters to Force Execution of Malicious Bytecode

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Compromising Confidential Compute, One Bug at a Time

Compromising Confidential Compute, One Bug at a Time

Я в опасности

Я в опасности

Refactoring a Data Vault Model

Refactoring a Data Vault Model

From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion

From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion

15 Ways to Break Your Copilot

15 Ways to Break Your Copilot

pwnable.tw - orw

pwnable.tw - orw

Lost in Translation: Exploiting Unicode Normalization

Lost in Translation: Exploiting Unicode Normalization

How Google DeepMind’s AI Won Silver at the Math Olympiad

How Google DeepMind’s AI Won Silver at the Math Olympiad

Out Of Control: How KCFG and KCET Redefine Control Flow Integrity in the Windows Kernel

Out Of Control: How KCFG and KCET Redefine Control Flow Integrity in the Windows Kernel

Why Does Fire BURN? Feynman's Answer Will DESTROY Your Reality

Why Does Fire BURN? Feynman's Answer Will DESTROY Your Reality

The Windows 11 Disaster That's Killing Microsoft

The Windows 11 Disaster That's Killing Microsoft

Weaponizing Apple AI for Offensive Operations

Weaponizing Apple AI for Offensive Operations

Introduction to Threat Hunting Using Garuda Framework - Hunting Living off the land attack (LoLbin)

Introduction to Threat Hunting Using Garuda Framework - Hunting Living off the land attack (LoLbin)

XUnprotect: Reverse Engineering macOS XProtect Remediator

XUnprotect: Reverse Engineering macOS XProtect Remediator

Microsoft begs for mercy

Microsoft begs for mercy

The Man Behind Google's AI Machine | Demis Hassabis Interview

The Man Behind Google's AI Machine | Demis Hassabis Interview

Clustered Points of Failure - Attacking Windows Server Failover Clusters

Clustered Points of Failure - Attacking Windows Server Failover Clusters

How Much Power Is Inside One Atom? Feynman’s Insane Discovery Explained || Learn With Feynman

How Much Power Is Inside One Atom? Feynman’s Insane Discovery Explained || Learn With Feynman

Keynote: Inside the Ransomware Machine

Keynote: Inside the Ransomware Machine

17 01 2026 Zapewne wielu z Was czekało na ten utwór i to wykonanie!

17 01 2026 Zapewne wielu z Was czekało na ten utwór i to wykonanie!

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com