skip to main content
10.1145/2613087.2613103acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Limiting access to unintentionally leaked sensitive documents using malware signatures

Published:25 June 2014Publication History

ABSTRACT

Organizations are repeatedly embarrassed when their sensitive digital documents go public or fall into the hands of adversaries, often as a result of unintentional or inadvertent leakage. Such leakage has been traditionally handled either by preventive means, which are evidently not hermetic, or by punitive measures taken after the main damage has already been done. Yet, the challenge of preventing a leaked file from spreading further among computers and over the Internet is not resolved by existing approaches. This paper presents a novel method, which aims at reducing and limiting the potential damage of a leakage that has already occurred. The main idea is to tag sensitive documents within the organization's boundaries by attaching a benign detectable malware signature (DMS). While the DMS is masked inside the organization, if a tagged document is somehow leaked out of the organization's boundaries, common security services such as Anti-Virus (AV) programs, firewalls or email gateways will detect the file as a real threat and will consequently delete or quarantine it, preventing it from spreading further. This paper discusses various aspects of the DMS, such as signature type and attachment techniques, along with proper design considerations and implementation issues. The proposed method was implemented and successfully tested on various file types including documents, spreadsheets, presentations, images, executable binaries and textual source code. The evaluation results have demonstrated its effectiveness in limiting the spread of leaked documents.

References

  1. A. Shabtai, Y. Elovici and L. Rokach, "A Survey of Data Leakage Detection and Prevention Solutions," Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BBC, "UK's families put on fraud alert," BBC NEWS, November 20, 2007. {Online}. Available: http://news.bbc.co.uk/2/hi/uk_news/politics/7103566.stm.Google ScholarGoogle Scholar
  3. K. Sack, "Patient Data Posted Online in Major Breach of Privacy," The New York Times, 8 September 201 {Online}. Available: http://www.nytimes.com/2011/09/09/us/09breach.html?_r=2&ref=stanforduniversity&.Google ScholarGoogle Scholar
  4. K. Stewart, "Utah Medicaid contractor loses job over data breach," The Salt Lake tribune, 17 Jan 2013 . {Online}. Available: http://www.sltrib.com/sltrib/news/55650800--78/health-medicaid-utah-breach.html.csp.Google ScholarGoogle Scholar
  5. Detica and Office of Cyber Security and Information Assurance, "The Cost of Cyber Crime," 2011.Google ScholarGoogle Scholar
  6. R. Anderson, C. Barton, R. Boehme, R. Clayton, M. van Eeten, M. Levi, T. Moore and S. Savage, "Measuring the Cost of Cybercrime," 2012.Google ScholarGoogle Scholar
  7. Z. Xiaosong, L. Fei, C. Ting and L. Hua, "Research and Application of the Transparent Data Encpryption in Intranet Data Leakage Prevention," Computational Intelligence and Security, 2009. CIS '09. , vol. II, pp. 376--379, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. Phua, "Protecting organisations from personal data breaches," Computer Fraud & Security, vol. 2009, no. 1, p. 13--18, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  9. Microsoft, "About Information Rights Management," Microsoft Office Website, 2013. {Online}. Available: http://office.microsoft.com/en-us/help/about-information-rights-management-HP006220859.aspx.Google ScholarGoogle Scholar
  10. OPSWAT, "Security Industry Market Share Analysis," OPSWAT, Inc., March 2012.Google ScholarGoogle Scholar
  11. M. Christodorescu and J. Somesh, "Testing Malware Detectors," in ACM SIGSOFT International Symposium on Software, Boston, Massachusetts, USA., 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Szor, "The art of computer virus research and defense," Addison Wesley, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Microsoft, "Microsoft Portable Executable and Common Object File Format Specification," Microsoft, 2010.Google ScholarGoogle Scholar
  14. "elf - format of Executable and Linking Format (ELF) files," The Linux man-pages project, 2010. {Online}. Available: http://man7.org/linux/man-pages/man5/elf.5.html.Google ScholarGoogle Scholar
  15. M. Sikorsky and A. Honig, "Practical malware analysis," No Starch Press, 2012.Google ScholarGoogle Scholar
  16. Kaspersky, "File Anti-Virus: actions upon threat detection," Kaspersky PURE 2.0, {Online}. Available: http://utils.kaspersky.com/special/pure_2/46_pure_file_antivir_actions_upon_threat_en.pdf. {Accessed 17 March 2013}.Google ScholarGoogle Scholar
  17. EICAR, "Anti-Malware testfile," European Institute for Computer Antivirus Research, 7 September 2006. {Online}. Available: http://www.eicar.org/86-0-Intended-use.html.Google ScholarGoogle Scholar
  18. VirusTotal, "VirusTotal, Free online virus, malware and URL scanner," {Online}. Available: https://www.virustotal.com/. {Accessed Feb. 2013}.Google ScholarGoogle Scholar
  19. Kaspersky Lab, "Digital Consumer's Online Trends and Risks," Kapersky Lab, 2012.Google ScholarGoogle Scholar
  20. Raschke, T. "The Forrester Wave : Data Leak Prevention, Q2 2008," Technical report, Forrester Research, Inc. 2008.Google ScholarGoogle Scholar
  21. Lawton, G. "New technology prevents data leakage," Computer 41.9 (2008): 14--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Spitzner, L. "Honeypots: Catching the insider threat," Computer Security Applications Conference, 2003. Proceedings. 19th Annual. IEEE, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Storey, D. "Catching flies with honey tokens," Network Security 2009.11 (2009): 15--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Papadimitriou, P, and Garcia-Molina, H. "Data leakage detection," Knowledge and Data Engineering, IEEE Transactions on 23.1 (2011): 51--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Stevens, D. "Malicious PDF documents explained," IEEE Security & Privacy, Vol. 9. No. 1, p. 80--82, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Microsoft, "The evolution of malware and the threat landscape -- a 10-year review," Microsoft Security Intelligence Report, special edition, 2012.Google ScholarGoogle Scholar
  27. Lenny Seltzer, "Malware sample sources for researchers," {Online}. Available: http://zeltser.com/combating-malicious-software/malware-sample-sources.html.Google ScholarGoogle Scholar
  28. Securelist, "Virus.DOS.Aids.552", {Online}. Available: http://www.securelist.com/en/descriptions/6880300/Virus.DOS.Aids.552.Google ScholarGoogle Scholar
  29. Symantec, "Understanding virus behavior under Windows NT," Symantec Reasearch Center. {Online}. Available: http://www.symantec.com/avcenter/reference/virus.behavior.under.win.nt.pdf.Google ScholarGoogle Scholar
  30. A. Shabtai, R. Moskovitch, Y. Elovici and C. Glezer, "Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey," Information Security Technical Report, vol. 14, no. 1, pp. 16--29, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Garetto, M., Gong, W., & Towsley, D. 2003. "Modeling malware spreading dynamics," In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3, pp. 1869--1879). IEEE.Google ScholarGoogle Scholar
  32. Wang, P., González, M. C., Hidalgo, C. A., & Barabási, A. L. 2009. "Understanding the spreading patterns of mobile phone viruses," Science, 324(5930), 1071--1076.Google ScholarGoogle Scholar
  33. Moreno, Y., Nekovee, M., & Pacheco, A. F. 2004. "Dynamics of rumor spreading in complex networks," Physical Review E, 69(6), 066130.Google ScholarGoogle Scholar
  34. Chierichetti, F., Lattanzi, S., & Panconesi, A. 2009. "Rumor spreading in social networks," In Automata, Languages and Programming (pp. 375--386). Springer Berlin Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Bordia, P., & DiFonzo, N. 2005. "Psychological motivations," in rumor spread. Rumor mills: The social impact of rumor and legend, 87--101.Google ScholarGoogle Scholar
  36. Evans, K. M., & Kuenning, G. H. 2002. "A study of irregularities in file-size distributions," In Proceedings of the 2002 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).Google ScholarGoogle Scholar
  37. Scarfo, A. 2012. "New security perspectives around BYOD," In Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications (pp. 446--451). IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Limiting access to unintentionally leaked sensitive documents using malware signatures

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SACMAT '14: Proceedings of the 19th ACM symposium on Access control models and technologies
              June 2014
              234 pages
              ISBN:9781450329392
              DOI:10.1145/2613087

              Copyright © 2014 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 25 June 2014

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              SACMAT '14 Paper Acceptance Rate17of58submissions,29%Overall Acceptance Rate177of597submissions,30%

              Upcoming Conference

              SACMAT 2024
            • Article Metrics

              • Downloads (Last 12 months)7
              • Downloads (Last 6 weeks)2

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader