SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Before We Knew It
                       An Empirical Study of Zero-Day Attacks In The Real World

                                    Leyla Bilge                                                    Tudor Dumitras
                                                                                                                ,
                           Symantec Research Labs                                              Symantec Research Labs
                          leylya_yumer@symantec.com                                          tudor_dumitras@symantec.com




ABSTRACT                                                                            1. INTRODUCTION
Little is known about the duration and prevalence of zero-                          A zero-day attack is a cyber attack exploiting a vulnerabil-
day attacks, which exploit vulnerabilities that have not been                       ity that has not been disclosed publicly. There is almost no
disclosed publicly. Knowledge of new vulnerabilities gives                          defense against a zero-day attack: while the vulnerability
cyber criminals a free pass to attack any target of their                           remains unknown, the software affected cannot be patched
choosing, while remaining undetected. Unfortunately, these                          and anti-virus products cannot detect the attack through
serious threats are difficult to analyze, because, in general,                        signature-based scanning. For cyber criminals, unpatched
data is not available until after an attack is discovered.                          vulnerabilities in popular software, such as Microsoft Office
Moreover, zero-day attacks are rare events that are unlikely                        or Adobe Flash, represent a free pass to any target they
to be observed in honeypots or in lab experiments.                                  might wish to attack, from Fortune 500 companies to mil-
   In this paper, we describe a method for automatically                            lions of consumer PCs around the world. For this reason, the
identifying zero-day attacks from field-gathered data that                           market value of a new vulnerability ranges between $5,000–
records when benign and malicious binaries are downloaded                           $250,000 [15, 20]. Examples of notable zero-day attacks in-
on 11 million real hosts around the world. Searching this                           clude the 2010 Hydraq trojan, also known as the “Aurora”
data set for malicious files that exploit known vulnerabili-                         attack that aimed to steal information from several compa-
ties indicates which files appeared on the Internet before the                       nies [16], the 2010 Stuxnet worm, which combined four zero-
corresponding vulnerabilities were disclosed. We identify 18                        day vulnerabilities to target industrial control systems [11],
vulnerabilities exploited before disclosure, of which 11 were                       and the 2011 attack against RSA [27]. Unfortunately, very
not previously known to have been employed in zero-day at-                          little is known about zero-day attacks because, in general,
tacks. We also find that a typical zero-day attack lasts 312                         data is not available until after the attacks are discovered.
days on average and that, after vulnerabilities are disclosed                       Prior studies rely on indirect measurements (e.g., analyzing
publicly, the volume of attacks exploiting them increases by                        patches and exploits) or the post-mortem analysis of isolated
up to 5 orders of magnitude.                                                        incidents, and they do not shed light on the the duration,
                                                                                    prevalence and characteristics of zero-day attacks.
Categories and Subject Descriptors                                                     Zero-day vulnerabilities are believed to be used primarily
                                                                                    for carrying out targeted attacks, based on the post-mortem
D.2.4 [Software Engineering]: Software/Program Verifi-                               analysis of the vulnerabilities that security analysts have
cation—Statistical methods; K.4.1 [Computers and So-                                connected to zero-day attacks [37]. However, prior research
ciety]: Public Policy Issues—Abuse and Crime Involving                              has focused on the entire window of exposure to a vulnera-
Computers; K.6.5 [Management of Computing and In-                                   bility, which lasts until all vulnerable hosts are patched and
formation Systems]: Security and Protection—Invasive                                which covers attacks initiated after the vulnerability was dis-
Software                                                                            closed [29]. For example, a study of three exploit archives
                                                                                    showed that 15% of these exploits were created before the
General Terms                                                                       disclosure of the corresponding vulnerability [12]. A follow-
                                                                                    up study found that only 65% of vulnerabilities in software
Measurement, Security
                                                                                    running on a typical Windows host have patches available
                                                                                    at disclosure [13], which provides an opportunity for attack-
Keywords                                                                            ers to exploit the unpatched vulnerabilities on a larger scale.
Zero-day attacks, Vulnerabilities, Full disclosure                                  These studies do not discern the security vulnerabilities that
                                                                                    are ultimately exploited in the wild, and they do not provide
                                                                                    any information on the window of opportunity for stealth
                                                                                    attacks, before the vulnerabilities exploited have been dis-
Permission to make digital or hard copies of all or part of this work for           closed publicly.
personal or classroom use is granted without fee provided that copies are              In this paper, we conduct a systematic study of zero-day
not made or distributed for profit or commercial advantage and that copies
                                                                                    attacks between 2008–2011. We develop a technique for
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific   identifying and analyzing zero-day attacks from the data
permission and/or a fee.                                                            available through the Worldwide Intelligence Network Envi-
CCS’12, October 16–18, 2012, Raleigh, North Carolina, USA.                          ronment (WINE), a platform for data intensive experiments
Copyright 2012 ACM 978-1-4503-1651-4/12/10 ...$15.00.
Table 1: Summary of findings.
  Findings                                                                    Implications
  Zero-day attacks are more frequent than previously thought: 11 out of       Zero-day attacks are serious threats that may have
  18 vulnerabilities identified were not known zero-day vulnerabilities.       a significant impact on the organizations affected.
  Zero-day attacks last between 19 days and 30 months, with a median          Zero-day attacks are not detected in a timely man-
  of 8 months and an average of approximately 10 months.                      ner using current policies and technologies.
  Most zero-day attacks affect few hosts, with the exception of a few          Most zero-day vulnerabilities are employed in tar-
  high-profile attacks (e.g., Stuxnet).                                        geted attacks.
  58% of the anti-virus signatures are still active at the time of writing.   Data covering 4 years is not sufficient for observing
                                                                              all the phases in the vulnerability lifecycle.
  After zero-day vulnerabilities are disclosed, the number of malware         The public disclosure of vulnerabilities is followed
  variants exploiting them increases 183–85,000 times and the number          by an increase of up to five orders of magnitude in
  of attacks increases 2–100,000 times.                                       the volume of attacks.
  Exploits for 42% of all vulnerabilities employed in host-based threats      Cyber criminals watch closely the disclosure of new
  are detected in field data within 30 days after the disclosure date.         vulnerabilities, in order to start exploiting them.


in cyber security [25]. WINE includes field data collected by         vulnerabilities are disclosed, the volume of attacks exploit-
Symantec on 11 million hosts around the world. These hosts           ing them increases by up to 5 orders of magnitude.
do not represent honeypots or machines in an artificial lab              These findings have important technology and policy im-
environment; they are real computers that are targeted by            plications. The challenges for identifying and analyzing elu-
cyber attacks. For example, the binary reputation data set           sive threats, such as zero-day attacks, emphasize that ex-
includes information on binary executables downloaded by             periments and empirical studies in cyber security must be
users who opt in for Symantec’s reputation-based security            conducted at scale by taking advantage of the resources that
program (which assigns a reputation score to binaries that           are available for this purpose, such as the WINE platform.
are not known to be either benign or malicious). The anti-           This will allow researchers and practitioners to investigate
virus telemetry data set includes reports about host-based           mitigation techniques for these threats based on empirical
threats (e.g., viruses, worms, trojans) detected by Syman-           data rather than on anecdotes and back-of-the-envelope cal-
tec’s anti-virus products.                                           culations. For example, the fact that zero-day attacks are
   The key idea behind our technique is to identify exe-             rare events, but that the new exploits are re-used for multi-
cutable files that are linked to exploits of known vulnerabil-        ple targeted attacks, suggests that techniques for assigning
ities. We start from the public information about disclosed          reputation based on the prevalence of files [9] can reduce the
vulnerabilities (i.e., vulnerabilities that have been assigned a     effectiveness of the exploit. Furthermore, because we quan-
CVE identifier [10]), available from vulnerability databases          tify the increase in the volume of attacks after vulnerability
and vendor advisories. We use the public Threat Explorer             disclosures, we provide new data for assessing the overall
web site [38] to determine threats identified by Symantec             benefit to society of the full disclosure policy, which calls for
that are linked to these vulnerabilities, and then we query          disclosing new vulnerabilities publicly, even if patches are
the anti-virus telemetry data set in WINE for the hashes             not yet available.
of all the distinct files (malware variants) that are detected           We make three contributions in this paper:
by these signatures. Finally, we search the history of binary
reputation submissions for these malicious files, which allows           • We propose a method for identifying zero-day attacks
us to estimate when and where they appeared on the In-                    from data collected on real hosts and made available
ternet. Correlating these independently-collected data sets               to the research community via the WINE platform.
allows us to study all the phases in the vulnerability life-            • We conduct a systematic study of the characteristics
cycle. For example, when we find records for the presence                  of zero-day attacks. Our findings are summarized in
of a malicious executable in the wild before the correspond-              Table 1.
ing vulnerability was disclosed, we have identified a zero-day
attack.                                                                 • We compare the impact of zero-day vulnerabilities be-
   To the best of our knowledge, this represents the first at-             fore and after their public disclosure, and we discuss
tempt to measure the prevalence and duration of zero-day                  the implications for the policy of full disclosure.
attacks, as well as the impact of vulnerability disclosure on
the volume of attacks observed. We identify 18 vulnera-                The remainder of the paper is organized as follows. In
bilities exploited in the real-world before disclosure. Out          Section 2 we define zero-day attacks and we state our goals
of these 18 vulnerabilities, 11 were not previously known to         in this paper. In Section 3 we review the current knowledge
have been employed in zero-day attacks, which suggests that          about zero-day attacks. In Section 4 we describe our method
zero-day attacks are more common than previously thought.            for identifying zero-day attacks automatically and the data
A typical zero-day attack lasts on average 312 days and hits         sets analyzed. In Section 5 we present our empirical results,
multiple targets around the world; however, some of these            and in Section 6 we discuss the implications of our findings.
attacks remain unknown for up to 2.5 years. After these
2.     PROBLEM STATEMENT AND GOALS
The Common Vulnerabilities and Exposures (CVE) consor-
tium maintains a database with extensive information about
vulnerabilities, including technical details and the disclosure
dates, that is a widely accepted standard for academia, gov-
ernmental organizations and the cyber security industry [10].
                                                                               tv       te            td       t0      ts   tp          ta
For CVE, a vulnerability is a software mistake that allows
                                                                                             Zero day attack        Follow-on attacks
attackers execute commands as other users, access data that
                                                                                             Window of exposure
has access restrictions, behave as another user or launch de-
nial of service attack. In general, a zero-day attack is an
attack that exploits vulnerabilities not yet disclosed to the            Figure 2: Attack timeline. These events do not al-
public. This is only one phase in the lifecycle of these vul-            ways occur in this order, but ta > tp ≥ td > tv and
nerabilities (see Figure 1). A security vulnerability starts             t0 ≥ td . The relation between td and te cannot be                  5

as a programming bug that evades testing. Cyber criminals                determined in most cases. For a zero-day attack
sometimes discover the vulnerabily, exploit it, and package              t0 > t e .
the exploit with a malicious payload to conduct zero-day
attacks against selected targets. After the vulnerability or
the exploits are discovered by the security community and                      rums and mailing lists. A CVE identifier (e.g., CVE-
described in a public advisory, the vendor of the affected                      2010-2568) is assigned to the vulnerability (time = t0 ).
software releases a patch for the vulnerability and security
vendors update anti-virus signatures to detect the exploit                  • Anti-virus signatures released. Once the vulnera-
or the specific attacks. However, the exploit is then reused,                  bility is disclosed, anti-virus vendors release new signa-
and in some cases additional exploits are created based on                    tures for ongoing attacks and created heuristic detec-
the patch [7], for attacks on a larger scale, targeting Internet              tions for the exploit. After this point, the attacks can
hosts that have not yet applied the patch. The race between                   be detected on end-hosts with updated A/V signatures
these attacks and the remediation measures introduced by                      (time = ts ).
the security community can continue for several years, until
the vulnerability ceases to affect end-hosts.                                • Patch released. On the disclosure date, or shortly
   The following events mark this lifecycle (Figure 2):                       afterward, the software vendor releases a patch for the
                                                                              vulnerability. After this point, the hosts that have ap-
     • Vulnerability introduced. A bug (e.g., program-                        plied the patch are no longer susceptible to the exploit
       ming mistake, memory mismanagement) is introduced                      (time = tp ).
       in software that is later released and deployed on hosts             • Patch deployment completed. All vulnerable
       around the world (time = tv ).                                         hosts worldwide are patched and the vulnerability
                                                                              ceases to have an impact (time = ta ).
     • Exploit released in the wild. Actors in the un-
       derground economy discover the vulnerability, create              A zero-day attack is characterized by a vulnerability that is
       a working exploit and use it to conduct stealth attacks           exploited in the wild before it is disclosed, i.e., t0 > te . Sim-
       against selected targets (time = te ).                            ilarly, a zero-day vulnerability is vulnerability employed in a
                                                                         zero-day attack. Our goals in this paper are to measure the
     • Vulnerability discovered by the vendor. The
                                                                         prevalence and duration of zero-day attacks and to compare
       vendor learns about the vulnerability (either by dis-
                                                                         the impact of zero-day vulnerabilities before and after t0 .
       covering it through testing or from a third-party re-
                                                                            Software vendors fix bugs and patch vulnerabilities in all
       port), assesses its severity, assigns a priority for fixing
                                                                         their product releases, and as a result some vulnerabilities
       it and starts working on a patch (time = td ).
                                                                         are never exploited or disclosed. In this paper, we only con-
                                                                         sider vulnerabilities that have been assigned a CVE identi-
     • Vulnerability disclosed publicly. The vulnerabil-
                                                                         fier. Similarly, in some cases vendors learn about a vulnera-
       ity is disclosed, either by the vendor or on public fo-
                                                                         bility before it is exploited, but consider it low priority, and
                                                                         cyber criminals may also delay the release of exploits until
                                                                         they identify a suitable target, to prevent the discovery of
                        Exploit             Zero-Day
                                                                         the vulnerability. While the CVE database sometimes indi-
                                             Attacks
                                                                         cates when vulnerabilities were reported to the vendors, it is
        Vulnerability                  Follow-on
                                                                         generally impossible to determine the exact date when the
                                        Attacks                          vendor or the cyber criminals discovered the vulnerability
                                                                         or even which discovery came first. We therefore consider
                                                       Dissemination &
                                                        Concealment      the disclosure date of the vulnerability as “day zero,” the
      Remediation
                                                                         end of the zero-day attack. Moreover, some exploits are not
                                  Patch                                  employed for malicious activities before the disclosure date
                                                                         and are disseminated as proofs-of-concept, to help the soft-
                                   A/V Signatures                        ware vendor understand the vulnerability and the anti-virus
                                                                         vendors update their signatures. When disclosed vulnera-
                                                                         bilities are left unpatched, this creates an opportunity for
     Figure 1: Lifecycle of zero-day vulnerabilities.                    cyber criminals to create additional exploits and to conduct
attacks on a larger scale; however, these attacks can usu-         bilities continue to be exploited even after patches become
ally be detected by an anti-virus program with up-to-date          available [3]. Frei compared how fast Microsoft and Apple
definitions. In this paper, we consider only exploits that          react to newly disclosed vulnerabilities and, while significant
have been used in real-world attacks before the correspond-        differences exist between the two vendors, both have some
ing vulnerabilities were disclosed.                                vulnerabilities with no patch available 180 days after disclo-
                                                                   sure [12]. A Secunia study showed that 50% of Windows
Non-goals. We do not aim to analyze the techniques used            users were exposed to 297 vulnerabilities in a year and that
to exploit zero-day vulnerabilities or for packing the mal-        patches for only 65% of these vulnerabilities were available
ware to avoid detection. We therefore focus on data that           at the time of their public disclosure [13]. Moreover, even
highlights the presence and propagation rate of malware on         after patches become available, users often delay their de-
the Internet, rather than on the static or behavioral analysis     ployment, partly because of the overhead of patch manage-
of the malware samples. The motivations behind zero-day            ment and partly because of the general observation that the
attacks, the dynamics of the market for zero-day vulnera-          process of fixing bugs tends to introduce additional software
bilities and the attacks against disclosed vulnerabilities for     defects. For example, a typical Windows user must manage
which patches are not available are also outside the scope of      14 update mechanisms to keep the host fully patched [13],
this study.                                                        while an empirical study suggested that over 10% of security
                                                                   patches have bugs of their own [5].
3. RELATED WORK                                                       While the market for zero-day vulnerabilities has not been
                                                                   studied as thoroughly as other aspects of the underground
Frei studied zero-day attacks by combining publicly avail-
                                                                   economy, the development of exploits for such vulnerabilities
able information on vulnerabilities disclosed between 2000–
                                                                   is certainly a profitable activity. For example, several secu-
2007 with a study of three exploit archives, popular in the
                                                                   rity firms run programs, such as HP’s Zero Day Initiative
hacker community [12]. This study showed that, on the
                                                                   and Verisign’s iDefense Vulnerability Contributor Program,
disclosure date, an exploit was available for 15% of vulnera-
                                                                   that pay developers up to $10,000 for their exploits [15, 20],
bilities and a patch was available for 43% of vulnerabilities
                                                                   with the purpose of developing intrusion-protection filters
(these percentages are not directly comparable because they
                                                                   against these exploits. Between 2000–2007, 10% of vulner-
are computed over different bases—all vulnerabilities that
                                                                   abilities have been disclosed through these programs [12].
have known exploits and all vulnerabilities that have been
                                                                   Similarly, software vendors often reward the discovery of new
patched, respectively). The study also found that 94% of ex-
                                                                   vulnerabilities in their products, offering prizes up to $60,000
ploits are created within 30 days after disclosure. However,
                                                                   for exploits against targets that are difficult to attack, such
the exploits included in public archives are proofs-of-concept
                                                                   as Google’s Chrome browser [14]. Moreover, certain firms
that are not always used in real-world attacks. Shahzad et
                                                                   and developers specialize in selling exploits to confidential
al. conduct a similar study, but on a larger data set [32].
                                                                   clients on the secretive, but legal, market for zero-day vul-
In this work, the authors analyze how the type and number
                                                                   nerabilities. Industry sources suggest that the market value
of vulnerabilities change during the period of their analysis
                                                                   of such vulnerabilities can reach $250,000 [15, 20]. In par-
window. McQueen et al. [18] analyze the lifespan of known
                                                                   ticular, the price of exploits against popular platforms, such
zero-day vulnerabilities in order to be able to estimate the
                                                                   as Windows, iOS or the major web browsers, may exceed
real number of zero-day vulnerabilities existed in the past.
                                                                   $100,000, depending on the complexity of the exploit and
In contrast to this previous work, we analyze field data, col-
                                                                   on how long the vulnerability remains undisclosed [15].
lected on real hosts targeted by cyber attacks, to understand
the prevalence and duration of zero-day attacks before vul-
nerabilities are disclosed, and we conduct a real-world anal-      4. IDENTIFYING ZERO-DAY ATTACKS
ysis rather than make statistical estimations.
   Symantec analysts identified 8–15 zero-day vulnerabilities
                                                                      AUTOMATICALLY
each year between 2006–2011 [37]. For example, 9 vulnera-          To identify zero-day attacks automatically, we analyze the
bilities were used in zero-day attacks in 2008, 12 in 2009, 14     historical information provided by multiple data sets. In
in 2010 and 8 in 2011. The 14 zero-day vulnerabilities dis-        this section, we describe our data sets and the ground truth
covered in 2010 affected the Windows operating system, as           for our analysis (§4.1). We then introduce our method for
well as widely used applications such as Internet Explorer,        identifying zero-day attacks (§4.2) and discuss the threats
Adobe Reader, and Adobe Flash Player. These vulnerabil-            to the validity of our findings (§4.3).
ities were employed in high-profile attacks, such as Stuxnet
and Hydraq. In 2009, Qualys analysts reported knowledge of         4.1 Data sets
56 zero-day vulnerabilities [24]. In contrast, to these reports,   We conduct our study on the Worldwide Intelligence Net-
we propose a technique for identifying zero-day attacks au-        work Environment (WINE), a platform for data intensive
tomatically from field data available to the research commu-        experiments in cyber security [25]. WINE was developed
nity, and we conduct a systematic study of zero-day attacks        at Symantec Research Labs for sharing comprehensive field
in the real world. In particular, we identify 11 vulnerabili-      data with the research community. WINE samples and ag-
ties, disclosed between 2008–2011, that were not known to          gregates multiple terabyte-size data sets, which Symantec
have been used in a zero-day attack.                               uses in its day-to-day operations, with the aim of support-
   Most prior work has focused on the entire window of ex-         ing open-ended experiments at scale. The data included in
posure to a vulnerability (see Figure 2), first defined by           WINE is collected on a representative subset of the hosts
Schneier [29]. Arbaugh et al. evaluated the number of              running Symantec products, such as the Norton Antivirus.
intrusions observed during each phase of the vulnerability         These hosts do not represent honeypots or machines in an
lifecycle and showed that a significant number of vulnera-          artificial lab environment; they are real computers, in active
“W32.Stuxnet”


                                                 CVE id
                                                                       Threat Explorer
                              OSVDB                                (public virus descriptions)



                                                                       virus id


                                           Anti-virus telemetry
                                            (virus detections)                               Dynamic
                                                                                             analysis
                                                                        file hash             results

                                                                                        hash of
                                            Binary reputation                         dropped file
                                             (file downloads)




                                                                                        Timestamp, MD5,
                                                                                        host count, etc.


                Figure 3: Overview of our method for identifying zero-day attacks systematically.


use around the world, that are targeted by cyber attacks.                  In this paper, we analyze two WINE data sets: anti-virus
WINE also enables the reproduction of prior experimental                telemetry and binary reputation. The anti-virus telemetry
results, by archiving the reference data sets that researchers          data records detections of known threats for which Symantec
use and by recording information on the data collection pro-            generated a signature that was subsequently deployed in an
cess and on the experimental procedures employed.                       anti-virus product. The anti-virus telemetry data in WINE
   We correlate the WINE data sets with information from                was collected between December 2009 and August 2011, and
three additional sources: the Open Source Vulnerability                 it includes 225 million detections that occurred on 9 million
Database (OSVDB) [21], Symantec’s Threat Explorer [38],                 hosts. From each record, we use the detection time, the
and a Symantec data set with dynamic analysis results for               associated threat label, the hash (MD5 and SHA2) of the
malware samples. While we process the data provided by                  malicious file, and the country where the machine resides.
OSVDB and Symantec Threat Explorer for forming the ba-                  We use this data in two ways: first, to link the threat labels
sis of our ground truth, we analyze WINE and the dynamic                with malicious files, and second, to enrich our knowledge
analysis results, in a further stage, to identify the zero-day          about the impact of zero-day vulnerabilities after they are
attacks.                                                                publicly disclosed.
   OSVDB is a public database that aggregates all the avail-               The binary reputation data, on the other hand, does not
able sources of information about vulnerabilities that have             record threat detections. Instead, it reports all the binary
been disclosed since 1998. Because the Microsoft Windows                executables—whether benign or malicious—that have been
platform has been the main target for cyber attacks over                downloaded on end-hosts around the world. The binary rep-
the past decade, we focus on vulnerabilities in Windows                 utation data in WINE was collected since February 2008,
or in software developed for Windows. The information                   and it includes 32 billion reports about approximately 300
we collected from OSVDB includes the discovery, disclo-                 million distinct files, which were downloaded on 11 million
sure and exploit release date of the vulnerabilities. To com-           hosts. Each report includes the download time, the hash
plete the picture of the vulnerability lifecycle, we collect the        (MD5 and SHA2) of the binary, and the URL from which
patch release dates from Microsoft and Adobe Security Bul-              it was downloaded These files may include malicious bina-
letins [1, 19].                                                         ries that were not detected at the time of their download
   Threat Explorer is a public web site with up-to-date in-             because the threat was unknown. We note that this data is
formation about the latest threats, risks and vulnerabilities.          collected only from the Symantec customers who gave their
In addition, it provides detailed historical information about          consent to share it. The binary reputation data allows us to
most threats for which Symantec has generated anti-virus                look back in time to get more insights about what happened
signatures. From these details, we are only interested in the           before signatures for malicious binaries were created. There-
malware class of the threat (e.g., Trojan, Virus, Worm), the            fore, analyzing this data set enables us to discover zero-day
signature generation date and associated CVE identifier(s),              attacks conducted in the past.
if the threat exploits known vulnerabilities. We build the                 In the recent years, most exploits are embedded in non-
ground truth of this study by combining information from                executable files such as *.pdf, *.doc, *.xlsx [39]. Because
OSVDB and Symantec Threat Explorer to prepare a list of                 the binary reputation data only reports executable files, it
threats along with the vulnerabilities they exploit.                    is not straightforward to find out whether a non-executable
exploit was involved in a zero-day attack or not. To ana-         Analyzing the presence of exploits on the Internet.
lyze non-executable exploits, we try to identify a customized     Having identified which executables exploit known cve id s,
malicious binary that was downloaded after a successful ex-       we search for each executable in the binary reputation data
ploitation, and we then search the binary in the binary rep-      to estimate when they first appeared on the Internet. Be-
utation data. To this end, we search the dynamic analysis         cause the binary reputation data indicates the presence of
data set to create a list of binaries that are downloaded after   these files, and not whether they were executed (or even if
the exploitation phase.                                           they could have executed on the platform where they were
                                                                  discovered), these reports indicate attacks rather than suc-
                                                                  cessful infections. As some virus id s match more than one
4.2    Method for identifying zero-day attacks                    variant, the first executable detected marks the start of the
Figure 3 illustrates our analysis method, which has five           attack. After this step, for each virus id in Z we can approx-
steps: building the ground truth, identifying exploits in exe-    imate the time when the attack started in the real world.
cutables, identifying executables dropped after exploitation      Identifying zero-day attacks.            Finally, to find the
(optional phase), analyzing the presence of exploits on the       virus id s involved in zero-day attacks we compare the start
Internet, and identifying zero-day attacks.                       dates of each attack with the disclosure dates of the corre-
Building the ground truth. We first gather information             sponding vulnerabilities. If at least one of the file hash id s
about vulnerabilities in Windows and in software running on       of a threat Zi = {virus idi , cve idi } was downloaded be-
the Windows platform by querying OSVDB and other ref-             fore the disclosure date of cve idi , we conclude that cve idi
erences about disclosed vulnerabilities (e.g., Microsoft Bul-     is a zero-day vulnerability and that virus idi performed a
letins). For all the vulnerabilities that are identified by a      zero-day attack.
CVE number we collect the discovery, disclosure, exploit re-
lease date and patch release dates. We then search Syman-         4.3 Threats to validity
tec’s Threat Explorer for these CVE numbers to identify the       The biggest threat to the validity of our results is selec-
threats that exploit these vulnerabilities. Each threat has a     tion bias. As WINE does not include data from hosts with-
name (e.g., W32.Stuxnet) and a numerical identifier, called        out Symantec’s anti-virus products, our results may not be
virus id. We manually filter out the virus id s that corre-        representative of the general population of platforms in the
spond to generic virus detections (e.g., “Trojan Horse”), as      world. In particular, users who install anti-virus software
identified by their Threat Explorer descriptions [38]. This        might be more careful with the security of their computers
step results in a mapping of threats to their corresponding       and, therefore, might be less exposed to attacks. Although
CVE identifiers, Zi = {virus idi , cve idi }, which are our        we cannot rule out the possibility of selection bias, the large
candidates for the zero-day attack study. Note that some          size of the population in our study (11 million hosts and
virus id s use more than one vulnerability, therefore in Zi it    300 million files) and the amount of zero-day vulnerabilities
is possible to observe the same virus id more than once.          we identify using our automated method (18, which is on
                                                                  the same order of magnitude as the 31 reported by Syman-
Identifying exploits in executables. In the second stage          tec analysts during the same period [37]) suggest that our
our aim is to identify the exploits that are detected by each     results have a broad applicability.
virus id in Z so that we can search for them in the binary           Moreover, for the zero-day vulnerabilities detected toward
reputation data. The anti-virus telemetry data set records        the beginning of our data collection period, we may underes-
the hashes of all the malicious files identified by Symantec’s      timate the duration of the attacks. We therefore caution the
anti-virus products. We represent each file recorded in the        reader that our results for the duration of zero-day attack
system with an identifier (file hash id ). Certain virus id s       are best interpreted as lower bounds.
detect a large number of file hash id s because of the poly-
morphism employed by malware authors to evade detection.
This step results in a mapping of threats to their variants,
Ei = {virus idi , f ile hash idi }.
                                                                  5. ANALYSIS RESULTS AND FINDINGS
                                                                  In this section, we analyze the zero-day vulnerabilities we
Identifying executables dropped after exploitation.               discover with the method described in Section 4. We build
When exploits are embedded in non-executable files, we can         our ground truth starting from a January 2012 copy of the
find their file hash id s in the anti-virus telemetry data but      OSVDB database. The binary reputation data we analyze
not in the binary reputation data. To detect zero-day at-         was collected between February 2008 and March 2012. As
tacks that employ such exploits, we query the dynamic anal-       this is the key component of our method, we can only iden-
ysis data set for files that are downloaded after successful ex-   tify zero-day attacks that occurred between 2008 and 2011.
ploitations performed by the file hash id s identified in the          We first apply our method without the optional step that
previous step. This step also produces a mapping of threats       takes into account the dynamic analysis data. As shown
to malicious files, but instead of listing the exploit files in     in Table 2, we identify 18 zero-day vulnerabilities: 3 dis-
E we add the dropped binary files. This may result in false        closed in 2008, 7 in 2009, 6 in 2010 and 2 in 2011. The sec-
positives because, even if we detect a dropped executable in      ond column of the table lists the anti-virus signatures linked
the binary reputation data before the disclosure date of the      to these vulnerabilities; the signatures are described on the
corresponding vulnerability, we cannot be confident that this      Threat Explorer web site [38]. While the exploit files asso-
executable was linked to a zero-day attack. In other words,       ciated with most vulnerabilities were detected by only one
the executable may have been downloaded using other in-           anti-virus signature—typically a heuristic detection for the
fection techniques. Therefore, this step is optional in our       exploit—there are some vulnerabilities associated with sev-
method.                                                           eral signatures. For example, CVE-2008-4250 was exploited
Table 2: The 0-day vulnerabilities identified by our automated method.

                                                                           Public                                           Hosts
 0-day vulnerability       Anti-virus signatures        Disclosure                          Attack Start      Variants
                                                                           Exploit                                         targeted
                                                           Date                                Date
                                                                            Release
 CVE-2008-0015             Bloodhoud.Exploit.259         2009-07-06        Not known          2008-12-28           1           2
 CVE-2008-2249             Bloodhound.Exploit.214        2008-12-09        Not known          2008-10-14           1           1
                           W32.Downadup
                           W32.Downadup.B
 CVE-2008-4250             W32.Fujacks.CE                2008-10-23        2008-10-23         2008-02-05          312        450 K
                           W32.Neeris.C
                           W32.Wapomi.B
 CVE-2009-0084             Bloodhound.Exploit.238        2009-04-14        Not known          2008-10-23           3           3
 CVE-2009-0561             Bloodhound.Exploit.251        2009-06-09        Not known          2009-01-11           1           1
 CVE-2009-0658             Trojan.Pidief                 2009-02-20        Not known          2008-09-02           7           23
 CVE-2009-1134             Bloodhound.Exploit.254        2009-06-09        Not known          2008-07-25           1         20 K
 CVE-2009-2501             Bloodhoud.Exploit.277         2009-10-13        Not known          2009-01-07           6           12
 CVE-2009-3126             Bloodhound.Exploit.278        2009-10-13        Not known          2009-01-27           6           16
 CVE-2009-4324             Trojan.Pidief.H               2009-12-14        2009-12-15         2009-03-15           1           3
 CVE-2010-0028             Bloodhound.Exploit.314        2010-02-10        Not known          2008-10-14          127         102
 CVE-2010-0480             Bloodhound.Exploit.324        2010-04-14        Not known          2010-03-26           1           1
 CVE-2010-1241             Bloodhound.Exploit.293        2010-04-11        Not known          2008-11-29           2           3
                           Bloodhound.Exploit.343
 CVE-2010-2568             W32.Stuxnet                   2010-07-17        2010-07-18         2008-02-13         3597        1.5 M
                           W32.Changeup.C
                           W32.Ramnit
 CVE-2010-2862             Bloodhound.Exploit.353        2010-08-04        Not known          2009-03-05           4           18
 CVE-2010-2883             Bloodhound.Exploit.357        2010-09-08        2010-09-07         2008-12-14           2           18
 CVE-2011-0618             Bloodhound.Exploit.412        2011-05-13        Not known          2010-01-03           1           1
 CVE-2011-1331             Trojan.Tarodrop.L             2011-06-16        Not known          2009-03-19          13           32



8 months before the disclosure date by Conficker (also known           abilities (see Table 3). For example, CVE-2010-2568 is one
as W32.Downadup) [23] and four other worms.                           of the four zero-day vulnerabilities exploited by Stuxnet and
   The third column of the table lists the disclosure date            it is known to have also been employed by another threat for
of these vulnerabilities, and the fifth column lists the ear-          more than 2 years before the disclosure date (17 July 2010).
liest occurrence, observable in WINE, of a file exploiting             As shown in Table 3, most of these vulnerabilities affected
them. For these vulnerabilities, exploits were active in the          Microsoft and Adobe products.
real world before disclosure, which indicates that they are              The zero-day attacks we identify lasted between 19 days
zero-day vulnerabilities. For comparison, in the fourth col-          (CVE-2010-0480) and 30 months (CVE-2010-2568), and the
umn of Table 2 we also report the exploit release dates, as           average duration of a zero-day attack is 312 days. Figure 4
recorded in public vulnerability databases such as OSVDB.             also illustrates this distribution. The last column in Table 2
This information is available for only 4 out of the 18 vul-           shows the number of hosts targeted before the zero-day at-
nerabilities and in all these cases the exploit release date is       tacks was detected. 15 of the zero-day vulnerabilities tar-
within one day of the vulnerability disclosure, while working         geted fewer than 1,000 hosts, out of the 11 million hosts in
exploits existed in the wild 8–30 months before disclosure.           our data set. On the other hand, 3 vulnerabilities were em-
This emphasizes the importance of analyzing field data when            ployed in attacks that infected thousands or even millions
studying zero-day attacks.                                            of Internet users. For example, Conficker exploiting the vul-
   To determine whether these vulnerabilities were already            nerability CVE-2008-4250 managed to infect approximately
known to have been involved in zero-day attacks, we manu-             370 thousand machines without being detected over more
ally search all 18 vulnerabilities on Google. From the annual         than two months. This example illustrates the effectiveness
vulnerability trends reports produced by Symantec [33–37]             of zero-day vulnerabilities for conducting stealth cyber at-
and the SANS Institute [28], as well as blog posts on the             tacks.
topic of zero-day vulnerabilities, we found out that 7 of our            We also ask the question whether the zero-day vulnera-
vulnerabilities are generally accepted to be zero-day vulner-         bilities continued to be exploited up until the end of our ex-
Table 3: New 0-day vulnerabilities discovered and their descriptions.

 0-day vulnerability                 New 0-day                Description
    CVE-2008-0015                                             Microsoft ATL Remote Code Executiong Vulnerabilitiy (RCEV)
    CVE-2008-2249                          Yes                Microsoft Windows GDI WMF Integer Overflow Vulnerability
    CVE-2008-4250                          Yes                Windows Server Service NetPathCanonicalize() Vulnerability
    CVE-2009-0084                          Yes                Microsoft DirectX DirectShow MJPEG Video Decompression RCEV
    CVE-2009-0561                          Yes                Microsoft Excel Malformed Record Object Integer Overflow
    CVE-2009-0658                                             Adobe Acrobat and Reader PDF File Handling JBIG2 Image RCEV
    CVE-2009-1134                          Yes                Microsoft Office Excel QSIR Record Pointer Corruption Vulnerability
    CVE-2009-2501                                             Microsoft GDI+ PNG File Processing RCEV
    CVE-2009-3126                          Yes                Microsoft GDI+ PNG File Integer Overflow RCEV
    CVE-2009-4324                                             Adobe Reader and Acrobat newplayer() JavaScript Method RCEV
    CVE-2010-0028                          Yes                Microsoft Paint JPEG Image Processing Integer Overflow
    CVE-2010-0480                          Yes                Microsoft Windows MPEG Layer-3 Audio Decoder Buffer Overflow Vulnerability
    CVE-2010-1241                          Yes                NITRO Web Gallery ’PictureId’ Parameter SQL Injection Vulnerability
    CVE-2010-2568                                             Microsoft Windows Shortcut ’LNK/PIF’ Files Automatic File Execution Vulnerability
    CVE-2010-2862                          Yes                Adobe Acrobat and Reader Font Parsing RCEV
    CVE-2010-2883                                             Adobe Reader ’CoolType.dll’ TTF Font RCEV
    CVE-2011-0618                          Yes                Adobe Flash Player ActionScript VM Remote Integer Overflow Vulnerability
    CVE-2011-1331                                             JustSystems Ichitaro Remote Heap Buffer Overflow Vulnerability



                                                              Vulnerabilities
                                                                                   4



                                                                                   3     2011 vulnerabilities                               q   q

                           CVE-2010-1241
                           CVE-2010-0028
                           CVE-2011-0618
                           CVE-2010-2862
                                                                                         2010 vulnerabilities                                       q    q q q      qq
                                                                                                                                                                    qq
                                                                                                                                                                     q



                                                                                   2
                                                   CVE-2009-0561
     CVE-2011-1331                                CVE-2008-0015
     CVE-2010-2568                                CVE-2009-0084                          2009 vulnerabilities   q                   q   q               qq          q
                                                                                                                                                                    q
                                                 CVE-2009-0658

                                            CVE-2009-3126
                                            CVE-2008-4250                          1
                                           CVE-2009-4324
                                           CVE-2009-1134                                 2008 vulnerabilities                                                q qq   qq
                                                                                                                                                                     q

                                                              CVE-2010-0480
                                                            CVE-2008-2249
                                       CVE-2009-2501
    PDF              CVE-2010-2883
                                                                                   0                                   20%      40%      60%        80%     100%
                                                                                                                    Percentage of time active after disclosure
                 -30        -24       -18         -12            -6           t0
                       Duration of zero-day attacks [months]

                                                                                       Figure 5: Percentage of the period after the dis-
Figure 4: Duration of zero-day attacks. The his-                                       closure date that zero-day vulnerabilities are still
tograms group attack durations in 3-month incre-                                       exploited. Each dot corresponds to an antivirus sig-
ments, before disclosure, and the red rug indicates                                    nature. 100% means that a vulnerability exploit was
the attack duration for each zero-day vulnerability.                                   still in use at the time of writing.


                                                                                       data covering 4 years is not sufficient for observing all the
perimentation period. Figure 5 shows the distribution of the                           phases in the vulnerability lifecycle (Figure 1).
time that we continue to detect anti-virus signatures linked                              While linking exploits to dropped executables through the
to these vulnerabilities, expressed as a percentage of the                             dynamic analysis of malware samples may produce false pos-
time between disclosure and the time of writing. The figure                             itives, we repeat our experiments taking this data set into
suggests that zero-day vulnerabilities do not loose their pop-                         account, to see if we can identify more zero-day vulnerabil-
ularity after the disclosure date. While two vulnerabilities,                          ities. We do not detect additional zero-day attacks in this
CVE-2009-1134 and CVE-2009-2501, ceased to have an im-                                 manner, but this optional step allows us to confirm 2 of the
pact after being exploited over a year, 58% of the anti-virus                          zero-day vulnerabilities that we have already discovered.
signatures are still active at the time of writing. Because of
this high fraction of vulnerabilities still in use, it would be                        5.1 Zero-day vulnerabilities after disclosure
meaningless to compute the half-life or the decay of the vul-                          To learn what happens after the disclosure of zero-day vul-
nerability usage. The only conclusion we can draw is that                              nerabilities, we investigate the volume of attacks exploiting
CVE-2009-4324
                                                                                                                 Malware variants
                                                                                                    100000
             Attacks                                                                                                              CVE-2009-4324                                   CVE-2009-0658
  100000                                       CVE-2010-2568        CVE-2010-0028
                                                                             CVE-2008-4250                                                                                    CVE-2009-0084
                                                                             CVE-2009-0084                                                                    CVE-2010-1241
                                                                                                         10000
   10000                                                                                                                                          CVE-2010-2862
                                                                                                                                                              CVE-2010-0480
                                                                                                                                                                       CVE-2009-0561
                                                                                                          1000
      1000                                                                                                                  CVE-2010-2883
                                                                                                                                                                     CVE-2009-3126
                                                                                                                                                                                 CVE-2008-2249
                                                                                                                                                                     CVE-2009-2501
                                                                                                                                                                         CVE-2008-0015
                                                                                                          100
       100
                                                                                                                  CVE-2010-0028



        10                    -2883                                                                        10
                   CVE-2010                                                                                      CVE-2011-1331
                                                                                                                                                                  CVE-2009-1134


         1                                                                                                  1

             -60       -40        -20     t0     20     40     60   80                                           -100        -50             t0          50           100            150
                                        Time [weeks]                                                                                        Time [weeks]

(a) Attacks exploiting zero-day vulnerabilities before and after the                              (b) Malware variants exploiting zero-day vulnerabilities
disclosure (time = t0 ).                                                                          before and after disclosure (time = t0 ).

Figure 6: Impact of vulnerability disclosures on the volume of attacks. We utilize logarithmic scales to
illustrate an increase of several orders of magnitude after disclosure.

                                                                                                  Vulnerabilities
these vulnerabilities over time. Specifically, we analyze the
                                                                                             60
variation of the number of malware variants, as they emerge
in the wild, and of the number of times they are detected.
Figure 6a shows how many downloads (before the disclo-                                       50

sure date) and detections (after the disclosure date) of the
exploits for the zero-day vulnerabilities were observed until                                40

the last exploitation attempt. The number of attacks in-
creases 2–100,000 times after the disclosure dates of these                                  30
vulnerabilities.
   Figure 6b shows that the number of variants (files exploit-                                20
ing the vulnerability) exhibits the same abrupt increase after
disclosure: 183–85,000 more variants are detected each day.                                  10
One reason for observing large number of new different files
that exploit the zero-day vulnerabilities might be that they                                  0
are repacked versions of the same exploits. However, it is
                                                                                                    t0
doubtful that repacking alone can account for an increase                                                               6              12              18                24                30

by up to 5 orders of magnitude. More likely, this increase is                                                                     Time to exploit [months]
the result of the extensive re-use of field-proven exploits in
other malware.                                                                               Figure 7: Time before vulnerabilities disclosed be-
   Figure 7 shows the time elapsed until all the vulnerabilities                             tween 2008–2011 started being exploited in the field.
disclosed between 2008 and 2011 started being exploited in                                   The histograms group the exploitation lag in 3-
the wild. Exploits for 42% of these vulnerabilities appear in                                month increments, after disclosure, and the red rug
the field data within 30 days after the disclosure date. This                                 indicates the lag for each exploited vulnerability.
illustrates the fact that the cyber criminals watch closely the                              The zero-day attacks are excluded from this figure.
disclosure of new vulnerabilities, in order to start exploiting
them, which causes a significant risk for end-users.
                                                                                             to identify on average 8 known zero-day vulnerabilities per
                                                                                             year.
5.2      Other Zero-day Vulnerabilities                                                        To understand the reasons why our method missed 24
Every year, Symantec analysts prepare an “Internet Secu-                                     zero-day vulnerabilities reported in ISTR, we performed a
rity Threats Report” (ISTR) in which new threats, vulner-                                    manual analysis on their characteristics, such as being em-
abilities and malware trends are reported. This report in-                                   ployed in highly targeted attacks, applying polymorphism
cludes information about the zero-day vulnerabilities iden-                                  etc. This study highlights the limitations of our method:
tified during the previous year. These reports identify 31
between 2008–2011: 9 in 2008, 12 in 2009, 14 in 2010 and                                          • Web Attacks: anti-virus telemetry only records de-
8 in 2011 [33–37]. For each year, our automated method                                              tections of host-based attacks. To detect web-based at-
discovers on average 3 zero-day vulnerabilities that were not                                       tacks, e.g. cross-site scripting attacks, we would need
known before and on average 2 zero-day vulnerabilities from                                         to analyze network based intrusion-detection data.
the list reported by Symantec. However, we were not able                                            While telemetry from Symantec’s intrusion detection
products is included in WINE, we did not consider           of cyber attacks. Automated methods for finding zero-day
     this data set in our study because it is not straightfor-   attacks in field data, such as the method we propose in this
     ward to correlate it with the binary reputation data.       paper, facilitate the systematic study of these threats. For
     Our method did not detect CVE-2011-2107, CVE-2011-          example, our method allows us to measure the duration of
     3765, etc. because these vulnerabilities are exploited      zero-day attacks (Figure 4). While the average duration is
     in web attacks.                                             approximately 10 months, the fact that all but one of the
                                                                 vulnerabilities disclosed after 2010 remained unknown for
   • Polymorphic malware: another limitation of our              more than 16 months suggests that we may be underesti-
     method is that, if the exploit files created for the zero-   mating the duration of zero-day attacks, as the data we an-
     day vulnerabilities are polymorphic, the file hashes         alyze goes back only to February 2008. In the future, such
     may be different in the anti-virus telemetry in binary       automated techniques will allow analysts to detect zero-day
     reputation data. Most of the zero-day exploits that         attacks faster, e.g., when a new exploit is reused in mul-
     we could not identify were polymorphic, for example,        tiple targeted attacks. However, this will require establish-
     CVE-2010-0806, CVE-2010-3654, CVE-2009-1537.                ing mechanisms for organizations to share information about
   • Non-executable exploits: In recent years, exploits          suspected targeted attacks with the security community.
     tend to be embedded in non-executable files such as             Our findings also provide new data for the debate on the
     pdf, doc, xlsx. Symantec’s anti-virus products pro-         benefits of the full disclosure policy. This policy is based
     vide detections for such malware, and the anti-virus        on the premise that disclosing vulnerabilities to the public,
     telemetry data contains records for detections of non-      rather than to the vendor, is the best way to fix them be-
     executable files. However, the binary reputation data        cause this provides an incentive for vendors to patch faster,
     only tracks binary files. Because we use the binary          rather than to rely on security-through-obscurity [29]. This
     reputation data to approximate the start dates of at-       debate is ongoing [2, 6, 30, 31], but most participants agree
     tacks, we cannot detect zero-day vulnerabilities that       that disclosing vulnerabilities causes an increase in the vol-
     are exploited by non-executable files. One workaround        ume of attacks. Indeed, this is what the supporters of full
     we considered was to link exploits in non-executable        disclosure are counting on, to provide a meaningful incentive
     files with the executable dropped once the exploit is        for patching. However, the participants to the debate dis-
     successful, by establishing correlations through dy-        agree about whether trading off a high volume of attacks for
     namic analysis results. Unfortunately, results for non-     faster patching provides an overall benefit to the society. For
     executable files were available only starting in late        example, Schneier initiated the debate by suggesting that, to
     2011 (i.e., almost the end of the period covered in our     mitigate the risk of disclosure, we should either patch all the
     study). Therefore, the dynamic analysis data set pro-       vulnerable hosts as soon as the fix becomes available, or we
     vided limited benefits. A representative example for         should limit the information available about the vulnerabil-
     vulnerabilities that we could not detect due to non-        ity [29]. Ozmet et al. concluded that disclosing information
     executable files problem is CVE-2011-0609, which was         about vulnerabilities improves system security [22], while
     exploited in RSA attack [27].                               Rescorla et al. could not find the same strong evidence on a
                                                                 more limited data set [26]. Arora et al. [4] and Cavusoglu et
   • Targeted attacks: zero-day vulnerabilities are usu-         al. [8] analyzed the impact of full disclosure using techniques
     ally exploited in targeted attacks [37]. Because these      inspired from game theory, and they reached opposite con-
     attacks target a limited number of organizations,           clusions about whether patches would immediately follow
     which hold sensitive information than can be stolen,        the disclosure of vulnerabilities.
     most consumers are not exposed to these attacks. Even          The root cause of these disagreements lies in the difficulty
     though we analyze binary reputation data collected on       of quantifying the real-world impact of vulnerability disclo-
     11 million hosts, this may not be is not sufficient for       sures and of patch releases without analyzing comprehensive
     identifying zero-day attacks that are highly targeted.      field data. We take a first step toward this goal by show-
                                                                 ing that the disclosure of zero-day vulnerabilities causes a
6. DISCUSSION                                                    significant risk for end-users, as the volume of attacks in-
                                                                 creases by up to 5 orders of magnitude. However, vendors
Zero-day attacks are difficult to prevent because they ex-
                                                                 prioritize which vulnerabilities they patch, giving more ur-
ploit unknown vulnerabilities, for which there are no patches
                                                                 gency to vulnerabilities that are disclosed or about to be
and no anti-virus or intrusion-detection signatures. It seems
                                                                 disclosed. For example, 80% of the 2007 vulnerabilities were
that, as long as software will have bugs and the development
                                                                 discovered more than 30 days before the disclosure date [12].
of exploits for new vulnerabilities will be a profitable activ-
                                                                 Moreover, even after patches become available users often
ity, we will be exposed to zero-day attacks. In fact, 60%
                                                                 delay their deployment, e.g., because a typical Windows user
of the zero-day vulnerabilities we identify in our study were
                                                                 must manage 14 update mechanisms to keep the host fully
not known before, which suggests that there are many more
                                                                 patched [13]. At the same time, anecdotal evidence suggests
zero-day attacks than previously thought—perhaps more
                                                                 that attackers also adapt their strategies to the expected
than twice as many. However, reputation-based technolo-
                                                                 disclosure of zero-day vulnerabilities. For example, the 2004
gies, which assign a score to each file based on its prevalence
                                                                 Witty worm was released less than 48 hours after the vulner-
in the wild and on a number of other inputs [9], single out
                                                                 ability it exploited was disclosed, which raised the suspicion
rare events such as zero-day attacks and can reduce the ef-
                                                                 that the attacker did not utilize a working exploit until the
fectiveness of the exploits.
                                                                 deployment of the patch was imminent [40]; the exploit file
   The large fraction of new zero-day vulnerabilities we iden-
                                                                 used in the 2011 attack against RSA was sent to 15 different
tify also emphasizes that zero-day attacks are difficult to
                                                                 organizations in the two weeks leading to the vulnerability’s
detect through manual analysis, given the current volume
disclosure, in an attempt to exploit is as much as possible              patch availability - an empirical analysis. In Workshop
before it was discovered and patched [17]. This is because               on the Economics of Information Security (WEIS
early disclosure reduces the value of zero-day vulnerabilities;          2004), 2004.
for example, some fees for new exploits are paid in install-       [5]   S. Beattie, S. Arnold, C. Cowan, P. Wagle, and
ments, with each subsequent payment depending on the lack                C. Wright. Timing the application of security patches
of a patch [15]. Additional research is needed for quanti-               for optimal uptime. In Large Installation System
fying these aspects of the full disclosure trade-off, e.g., by            Administration Conference, pages 233–242,
measuring how quickly vulnerable hosts are patched in the                Philadelphia, PA, Nov 2002.
field, following vulnerability disclosures. Like our study of       [6]   J. Bollinger. Economies of disclosure. In SIGCAS
zero-day attacks, answering these additional research ques-              Comput. Soc., 2004.
tions will require empirical studies conducted at scale, using     [7]   D. Brumley, P. Poosankam, D. X. Song, and J. Zheng.
comprehensive field data.                                                 Automatic patch-based exploit generation is possible:
                                                                         Techniques and implications. In IEEE Symposium on
7.   CONCLUSION                                                          Security and Privacy, pages 143–157, Oakland, CA,
Zero-day attacks have been discussed for decades, but no                 May 2008.
study has yet measured the duration and prevalence of these        [8]   H. C. H. Cavusoglu and S. Raghunathan. Emerging
attacks in the real world, before the disclosure of the corre-           issues in responsible vulnerability disclosure. In
sponding vulnerabilities. We take a first step in this direc-             Workshop on Information Technology and Systems,
tion by analyzing field data collected on 11 million Windows              2004.
hosts over a period of 4 years. The key idea in our study          [9]   D. H. P. Chau, C. Nachenberg, J. Wilhelm, A. Wright,
is to identify executable files that are linked to exploits of            and C. Faloutsos. Polonium : Tera-scale graph mining
known vulnerabilities. By searching for these files in a data             for malware detection. In SIAM International
set with historical records of files downloaded on end-hosts              Conference on Data Mining (SDM), Mesa, AZ, April
around the world, we systematically identify zero-day at-                2011.
tacks and we analyze their evolution in time.                     [10]   CVE. A dictionary of publicly known information
   We identify 18 vulnerabilities exploited in the wild before           security vulnerabilities and exposures.
their disclosure, of which 11 were not previously known to               http://cve.mitre.org/, 2012.
have been employed in zero-day attacks. Zero-day attacks          [11]   N. Falliere, L. O’Murchu, and E. Chien. W32.stuxnet
last on average 312 days, and up to 30 months, and they                  dossier. http://www.symantec.com/content/en/us/
typically affect few hosts. However, there are some excep-                enterprise/media/security_response/
tions for high profile attacks such as Conficker and Stuxnet,              whitepapers/w32_stuxnet_dossier.pdf, February
which we respectively detected on hundreds of thousands                  2011.
and millions of the hosts in our study, before the vulnera-       [12]   S. Frei. Security Econometrics: The Dynamics of
bility disclosure. After the disclosure of zero-day vulnera-             (In)Security. PhD thesis, ETH Z¨rich, 2009.
                                                                                                            u
bilities, the volume of attacks exploiting them increases by
                                                                  [13]   S. Frei. End-Point Security Failures, Insight gained
up to 5 orders of magnitude. These findings have important
                                                                         from Secunia PSI scans. Predict Workshop, February
implications for future security technologies and for public
                                                                         2011.
policy.
                                                                  [14]   Google Inc. Pwnium: rewards for exploits, February
                                                                         2012. http://blog.chromium.org/2012/02/
Acknowledgments                                                          pwnium-rewards-for-exploits.html.
We thank Jonathan McCune and Michael Hicks for stimu-             [15]   A. Greenberg. Shopping for zero-days: A price list for
lating discussions on the topic of zero-day attacks. We also             hackers’ secret software exploits. Forbes, 23 March
thank Marc Dacier for his early feedback on our results, and             2012. http://www.forbes.com/sites/
the anonymous CCS reviewers for their constructive feed-                 andygreenberg/2012/03/23/
back. Finally, this research would not have been possible                shopping-for-zero-days-an-price-list-for-hackers-secret-so
without the WINE platform, built and made available to            [16]   A. Lelli. The Trojan.Hydraq incident: Analysis of the
the research community by Symantec. Our results can be                   Aurora 0-day exploit.
reproduced by utilizing the reference data set WINE 2012-                http://www.symantec.com/connect/blogs/
003, archived in the WINE infrastructure.                                trojanhydraq-incident-analysis-aurora-0-day-exploit,
                                                                         25 January 2010.
8. REFERENCES                                                     [17]   R. McMillan. RSA spearphish attack may have hit US
 [1] Adobe Systems Incorporated. Security bulletins and                  defense organizations. PC World, 8 September 2011.
     advisories.                                                         http://www.pcworld.com/businesscenter/article/
     http://www.adobe.com/support/security/, 2012.                       239728/rsa_spearphish_attack_may_have_hit_us_
 [2] R. Anderson and T. Moore. The economics of                          defense_organizations.html.
     information security. In Science, vol. 314, no. 5799,        [18]   M. A. McQueen, T. A. McQueen, W. F. Boyer, and
     2006.                                                               M. R. Chaffin. Empirical estimates and observations
 [3] W. A. Arbaugh, W. L. Fithen, and J. McHugh.                         of 0day vulnerabilities. In Hawaii International
     Windows of vulnerability: A case study analysis.                    Conference on System Sciences, 2009.
     IEEE Computer, 33(12), December 2000.                        [19]   Microsoft. Microsoft security bulletins. http://
 [4] A. Arora, R. Krishnan, A. Nandkumar, R. Telang,                     technet.microsoft.com/en-us/security/bulletin,
     and Y. Yang. Impact of vulnerability disclosure and                 2012.
[20] C. Miller. The legitimate vulnerability market: Inside      [38] Symantec Corporation. Symantec threat explorer.
     the secretive world of 0-day exploit sales. In Workshop          http://www.symantec.com/security_response/
     on the Economics of Information Security, Pittsburgh,            threatexplorer/azlisting.jsp, 2012.
     PA, June 2007.                                              [39] Symantec.cloud. February 2011 intelligence report.
[21] OSVDB. The open source vulnerability database.                   http://www.messagelabs.com/mlireport/MLI_2011_
     http://www.osvdb.org/, 2012.                                     02_February_FINAL-en.PDF, 2011.
[22] A. Ozment and S. E. Schechter. Milk or wine: does           [40] N. Weaver and D. Ellis. Reflections on Witty:
     software security improve with age? In 15th                      Analyzing the attacker. ;login: The USENIX
     conference on USENIX Security Symposium, 2006.                   Magazine, 29(3):34–37, June 2004.
[23] P. Porras, H. Saidi, and V. Yegneswaran. An anlysis of
     conficker’s logic and rendezvous points.
     http://mtc.sri.com/Conficker/, 2009.
[24] Qualys, Inc. The laws of vulnerabilities 2.0.
     http://www.qualys.com/docs/Laws_2.0.pdf, July
     2009.
[25] T. Dumitraș and D. Shou. Toward a standard
     benchmark for computer security research: The
     Worldwide Intelligence Network Environment
     (WINE). In EuroSys BADGERS Workshop, Salzburg,
     Austria, Apr 2011.
[26] E. Rescorla. Is finding security holes a good idea? In
     IEEE Security and Privacy, 2005.
[27] U. Rivner. Anatomy of an attack, 1 April 2011. http:
     //blogs.rsa.com/rivner/anatomy-of-an-attack/
     Retrieved on 19 April 2012.
[28] SANS Institute. Top cyber security risks - zero-day
     vulnerability trends. http://www.sans.org/
     top-cyber-security-risks/zero-day.php, 2009.
[29] B. Schneier. Cryptogram september 2000 - full
     disclosure and the window of exposure.
     http://www.schneier.com/crypto-gram-0009.html,
     2000.
[30] B. Schneier. Locks and full disclosure. In IEEE
     Security and Privacy, 2003.
[31] B. Schneier. The nonsecurity of secrecy. In Commun.
     ACM, 2004.
[32] M. Shahzad, M. Z. Shafiq, and A. X. Liu. A large
     scale exploratory analysis of software vulnerability life
     cycles. In Proceedings of the 2012 International
     Conference on Software Engineering, 2012.
[33] Symantec Corporation. Symantec global Internet
     security threat report, volume 13.
     http://eval.symantec.com/mktginfo/enterprise/
     white_papers/b-whitepaper_internet_security_
     threat_report_xiii_04-2008.en-us.pdf, April 2008.
[34] Symantec Corporation. Symantec global Internet
     security threat report, volume 14.
     http://eval.symantec.com/mktginfo/enterprise/
     white_papers/b-whitepaper_internet_security_
     threat_report_xv_04-2010.en-us.pdf, April 2009.
[35] Symantec Corporation. Symantec global Internet
     security threat report, volume 15. http://msisac.
     cisecurity.org/resources/reports/documents/
     SymantecInternetSecurityThreatReport2010.pdf,
     April 2010.
[36] Symantec Corporation. Symantec Internet security
     threat report, volume 16, April 2011.
[37] Symantec Corporation. Symantec Internet security
     threat report, volume 17.
     http://www.symantec.com/threatreport/, April
     2012.

Mais conteúdo relacionado

Mais procurados

Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitPR Americas
 
F-Secure Security Threat Report, H1 2012
F-Secure Security Threat Report, H1 2012F-Secure Security Threat Report, H1 2012
F-Secure Security Threat Report, H1 2012F-Secure Corporation
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineLastline, Inc.
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseNeelabh Rai
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesSecunia
 
certified ethical_hacker_sample
certified ethical_hacker_samplecertified ethical_hacker_sample
certified ethical_hacker_sampleAmbuj Sharma
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWSylvain Martinez
 
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Source Conference
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malwareDigital Pymes
 
The Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial SecurityThe Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial SecurityDragos, Inc.
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...Clare Nelson, CISSP, CIPP-E
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
 
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...EC-Council
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...CODE BLUE
 
Cyber Deception After Detection: Safe Observation Environment Using Software ...
Cyber Deception After Detection: Safe Observation Environment Using Software ...Cyber Deception After Detection: Safe Observation Environment Using Software ...
Cyber Deception After Detection: Safe Observation Environment Using Software ...Shimanaka Tohru
 
Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN A...
Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN A...Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN A...
Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN A...Shimanaka Tohru
 

Mais procurados (19)

Kaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst SummitKaspersky North American Virus Analyst Summit
Kaspersky North American Virus Analyst Summit
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
F-Secure Security Threat Report, H1 2012
F-Secure Security Threat Report, H1 2012F-Secure Security Threat Report, H1 2012
F-Secure Security Threat Report, H1 2012
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
Threat Report H2 2012
Threat Report H2 2012Threat Report H2 2012
Threat Report H2 2012
 
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet CaseMag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
Mag-Securs No.29, 2011 - Validy: Learning from the Stuxnet Case
 
Maximize Computer Security With Limited Ressources
Maximize Computer Security With Limited RessourcesMaximize Computer Security With Limited Ressources
Maximize Computer Security With Limited Ressources
 
certified ethical_hacker_sample
certified ethical_hacker_samplecertified ethical_hacker_sample
certified ethical_hacker_sample
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
 
Ehc brochure
Ehc brochureEhc brochure
Ehc brochure
 
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011
 
12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware12102 vipre business-protecting-against-the-new-wave-of-malware
12102 vipre business-protecting-against-the-new-wave-of-malware
 
The Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial SecurityThe Four Types of Threat Detection and Use Cases in Industrial Security
The Four Types of Threat Detection and Use Cases in Industrial Security
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
 
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
 
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
Lessons learned from hundreds of cyber espionage breaches by TT and Ashley - ...
 
Cyber Deception After Detection: Safe Observation Environment Using Software ...
Cyber Deception After Detection: Safe Observation Environment Using Software ...Cyber Deception After Detection: Safe Observation Environment Using Software ...
Cyber Deception After Detection: Safe Observation Environment Using Software ...
 
Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN A...
Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN A...Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN A...
Cyber Deception Architecture: Covert Attack Reconnaissance Using a Safe SDN A...
 

Destaque

а2 лист 2
а2 лист 2а2 лист 2
а2 лист 2GRIGORYEVA
 
а2 лист 4
а2 лист 4а2 лист 4
а2 лист 4GRIGORYEVA
 
ДЛЯ МОБИЛЬНЫХ РАЗРАБОТЧИКОВ
ДЛЯ МОБИЛЬНЫХ РАЗРАБОТЧИКОВДЛЯ МОБИЛЬНЫХ РАЗРАБОТЧИКОВ
ДЛЯ МОБИЛЬНЫХ РАЗРАБОТЧИКОВEmpatika
 
дбн а.2.2 3-2012 редакція остаточна
дбн а.2.2 3-2012 редакція остаточнадбн а.2.2 3-2012 редакція остаточна
дбн а.2.2 3-2012 редакція остаточнаYegor Shulyk
 
ЕКТ QlikView конференция Минск 2014 А2 Консалтинг
ЕКТ QlikView конференция Минск 2014 А2 Консалтинг ЕКТ QlikView конференция Минск 2014 А2 Консалтинг
ЕКТ QlikView конференция Минск 2014 А2 Консалтинг a2consulting
 
Гараж QlikView конференция Минск 2014 А2 Консалтинг
Гараж QlikView конференция Минск 2014  А2 Консалтинг Гараж QlikView конференция Минск 2014  А2 Консалтинг
Гараж QlikView конференция Минск 2014 А2 Консалтинг a2consulting
 
алгебра 7 класс дорофеев гдз
алгебра 7 класс дорофеев гдзалгебра 7 класс дорофеев гдз
алгебра 7 класс дорофеев гдзИван Иванов
 
Сердечна В.В
Сердечна В.ВСердечна В.В
Сердечна В.Вymcmb_ua
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?Zoltan Balazs
 
зад2 примеры решения задач
зад2 примеры решения задачзад2 примеры решения задач
зад2 примеры решения задачZhanna Kazakova
 
2013 syscan360 yuki_chen_syscan360_exploit your java native vulnerabilities o...
2013 syscan360 yuki_chen_syscan360_exploit your java native vulnerabilities o...2013 syscan360 yuki_chen_syscan360_exploit your java native vulnerabilities o...
2013 syscan360 yuki_chen_syscan360_exploit your java native vulnerabilities o...chen yuki
 

Destaque (11)

а2 лист 2
а2 лист 2а2 лист 2
а2 лист 2
 
а2 лист 4
а2 лист 4а2 лист 4
а2 лист 4
 
ДЛЯ МОБИЛЬНЫХ РАЗРАБОТЧИКОВ
ДЛЯ МОБИЛЬНЫХ РАЗРАБОТЧИКОВДЛЯ МОБИЛЬНЫХ РАЗРАБОТЧИКОВ
ДЛЯ МОБИЛЬНЫХ РАЗРАБОТЧИКОВ
 
дбн а.2.2 3-2012 редакція остаточна
дбн а.2.2 3-2012 редакція остаточнадбн а.2.2 3-2012 редакція остаточна
дбн а.2.2 3-2012 редакція остаточна
 
ЕКТ QlikView конференция Минск 2014 А2 Консалтинг
ЕКТ QlikView конференция Минск 2014 А2 Консалтинг ЕКТ QlikView конференция Минск 2014 А2 Консалтинг
ЕКТ QlikView конференция Минск 2014 А2 Консалтинг
 
Гараж QlikView конференция Минск 2014 А2 Консалтинг
Гараж QlikView конференция Минск 2014  А2 Консалтинг Гараж QlikView конференция Минск 2014  А2 Консалтинг
Гараж QlikView конференция Минск 2014 А2 Консалтинг
 
алгебра 7 класс дорофеев гдз
алгебра 7 класс дорофеев гдзалгебра 7 класс дорофеев гдз
алгебра 7 класс дорофеев гдз
 
Сердечна В.В
Сердечна В.ВСердечна В.В
Сердечна В.В
 
IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?IoT security is a nightmare. But what is the real risk?
IoT security is a nightmare. But what is the real risk?
 
зад2 примеры решения задач
зад2 примеры решения задачзад2 примеры решения задач
зад2 примеры решения задач
 
2013 syscan360 yuki_chen_syscan360_exploit your java native vulnerabilities o...
2013 syscan360 yuki_chen_syscan360_exploit your java native vulnerabilities o...2013 syscan360 yuki_chen_syscan360_exploit your java native vulnerabilities o...
2013 syscan360 yuki_chen_syscan360_exploit your java native vulnerabilities o...
 

Semelhante a Before We Knew It: An Empirical Study of Zero-Day Attacks

Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingMehrdad Jingoism
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies viaIJNSA Journal
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESIJNSA Journal
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superwormUltraUploader
 
An overview of computer viruses in a research environment
An overview of computer viruses in a research environmentAn overview of computer viruses in a research environment
An overview of computer viruses in a research environmentUltraUploader
 
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...uzair
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...IJNSA Journal
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadOpenDNS
 
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...IJNSA Journal
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...IOSR Journals
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...Ahmad Sharifi
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015Andreanne Clarke
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252IJMER
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorismNihal Jani
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsAlison Hall
 

Semelhante a Before We Knew It: An Empirical Study of Zero-Day Attacks (20)

Cehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hackingCehv8 module 01 introduction to ethical hacking
Cehv8 module 01 introduction to ethical hacking
 
Deterring hacking strategies via
Deterring hacking strategies viaDeterring hacking strategies via
Deterring hacking strategies via
 
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIESDETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
DETERRING HACKING STRATEGIES VIA TARGETING SCANNING PROPERTIES
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
 
An overview of computer viruses in a research environment
An overview of computer viruses in a research environmentAn overview of computer viruses in a research environment
An overview of computer viruses in a research environment
 
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
 
White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2
 
White hat march15 v2.2
White hat march15 v2.2White hat march15 v2.2
White hat march15 v2.2
 
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...Network Threat Characterization in Multiple Intrusion Perspectives using Data...
Network Threat Characterization in Multiple Intrusion Perspectives using Data...
 
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie AheadRethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
 
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
ONTOLOGY-BASED MODEL FOR SECURITY ASSESSMENT: PREDICTING CYBERATTACKS THROUGH...
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and Security...
 
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
An Overview of Intrusion Detection and Prevention Systems (IDPS) and security...
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 

Mais de Комсс Файквэе

Rp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgRp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgКомсс Файквэе
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingКомсс Файквэе
 

Mais de Комсс Файквэе (20)

Ksb 2013 ru
Ksb 2013 ruKsb 2013 ru
Ksb 2013 ru
 
Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013Rp quarterly-threat-q3-2013
Rp quarterly-threat-q3-2013
 
Rp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xgRp data breach-investigations-report-2013-en_xg
Rp data breach-investigations-report-2013-en_xg
 
Apwg trends report_q2_2013
Apwg trends report_q2_2013Apwg trends report_q2_2013
Apwg trends report_q2_2013
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
Scimp paper
Scimp paperScimp paper
Scimp paper
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Hta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijackingHta t07-did-you-read-the-news-http-request-hijacking
Hta t07-did-you-read-the-news-http-request-hijacking
 
Analitika web 2012_positive_technologies
Analitika web 2012_positive_technologiesAnalitika web 2012_positive_technologies
Analitika web 2012_positive_technologies
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
B intelligence report-08-2013.en-us
B intelligence report-08-2013.en-usB intelligence report-08-2013.en-us
B intelligence report-08-2013.en-us
 
Dtl 2013 q2_home.1.2
Dtl 2013 q2_home.1.2Dtl 2013 q2_home.1.2
Dtl 2013 q2_home.1.2
 
Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012Rp quarterly-threat-q1-2012
Rp quarterly-threat-q1-2012
 
Kaspersky lab av_test_whitelist_test_report
Kaspersky lab av_test_whitelist_test_reportKaspersky lab av_test_whitelist_test_report
Kaspersky lab av_test_whitelist_test_report
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
 
Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2
 
Panda labs annual-report-2012
Panda labs annual-report-2012Panda labs annual-report-2012
Panda labs annual-report-2012
 
H02 syllabus
H02 syllabusH02 syllabus
H02 syllabus
 
Course reader-title
Course reader-titleCourse reader-title
Course reader-title
 

Último

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Before We Knew It: An Empirical Study of Zero-Day Attacks

  • 1. Before We Knew It An Empirical Study of Zero-Day Attacks In The Real World Leyla Bilge Tudor Dumitras , Symantec Research Labs Symantec Research Labs leylya_yumer@symantec.com tudor_dumitras@symantec.com ABSTRACT 1. INTRODUCTION Little is known about the duration and prevalence of zero- A zero-day attack is a cyber attack exploiting a vulnerabil- day attacks, which exploit vulnerabilities that have not been ity that has not been disclosed publicly. There is almost no disclosed publicly. Knowledge of new vulnerabilities gives defense against a zero-day attack: while the vulnerability cyber criminals a free pass to attack any target of their remains unknown, the software affected cannot be patched choosing, while remaining undetected. Unfortunately, these and anti-virus products cannot detect the attack through serious threats are difficult to analyze, because, in general, signature-based scanning. For cyber criminals, unpatched data is not available until after an attack is discovered. vulnerabilities in popular software, such as Microsoft Office Moreover, zero-day attacks are rare events that are unlikely or Adobe Flash, represent a free pass to any target they to be observed in honeypots or in lab experiments. might wish to attack, from Fortune 500 companies to mil- In this paper, we describe a method for automatically lions of consumer PCs around the world. For this reason, the identifying zero-day attacks from field-gathered data that market value of a new vulnerability ranges between $5,000– records when benign and malicious binaries are downloaded $250,000 [15, 20]. Examples of notable zero-day attacks in- on 11 million real hosts around the world. Searching this clude the 2010 Hydraq trojan, also known as the “Aurora” data set for malicious files that exploit known vulnerabili- attack that aimed to steal information from several compa- ties indicates which files appeared on the Internet before the nies [16], the 2010 Stuxnet worm, which combined four zero- corresponding vulnerabilities were disclosed. We identify 18 day vulnerabilities to target industrial control systems [11], vulnerabilities exploited before disclosure, of which 11 were and the 2011 attack against RSA [27]. Unfortunately, very not previously known to have been employed in zero-day at- little is known about zero-day attacks because, in general, tacks. We also find that a typical zero-day attack lasts 312 data is not available until after the attacks are discovered. days on average and that, after vulnerabilities are disclosed Prior studies rely on indirect measurements (e.g., analyzing publicly, the volume of attacks exploiting them increases by patches and exploits) or the post-mortem analysis of isolated up to 5 orders of magnitude. incidents, and they do not shed light on the the duration, prevalence and characteristics of zero-day attacks. Categories and Subject Descriptors Zero-day vulnerabilities are believed to be used primarily for carrying out targeted attacks, based on the post-mortem D.2.4 [Software Engineering]: Software/Program Verifi- analysis of the vulnerabilities that security analysts have cation—Statistical methods; K.4.1 [Computers and So- connected to zero-day attacks [37]. However, prior research ciety]: Public Policy Issues—Abuse and Crime Involving has focused on the entire window of exposure to a vulnera- Computers; K.6.5 [Management of Computing and In- bility, which lasts until all vulnerable hosts are patched and formation Systems]: Security and Protection—Invasive which covers attacks initiated after the vulnerability was dis- Software closed [29]. For example, a study of three exploit archives showed that 15% of these exploits were created before the General Terms disclosure of the corresponding vulnerability [12]. A follow- up study found that only 65% of vulnerabilities in software Measurement, Security running on a typical Windows host have patches available at disclosure [13], which provides an opportunity for attack- Keywords ers to exploit the unpatched vulnerabilities on a larger scale. Zero-day attacks, Vulnerabilities, Full disclosure These studies do not discern the security vulnerabilities that are ultimately exploited in the wild, and they do not provide any information on the window of opportunity for stealth attacks, before the vulnerabilities exploited have been dis- Permission to make digital or hard copies of all or part of this work for closed publicly. personal or classroom use is granted without fee provided that copies are In this paper, we conduct a systematic study of zero-day not made or distributed for profit or commercial advantage and that copies attacks between 2008–2011. We develop a technique for bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific identifying and analyzing zero-day attacks from the data permission and/or a fee. available through the Worldwide Intelligence Network Envi- CCS’12, October 16–18, 2012, Raleigh, North Carolina, USA. ronment (WINE), a platform for data intensive experiments Copyright 2012 ACM 978-1-4503-1651-4/12/10 ...$15.00.
  • 2. Table 1: Summary of findings. Findings Implications Zero-day attacks are more frequent than previously thought: 11 out of Zero-day attacks are serious threats that may have 18 vulnerabilities identified were not known zero-day vulnerabilities. a significant impact on the organizations affected. Zero-day attacks last between 19 days and 30 months, with a median Zero-day attacks are not detected in a timely man- of 8 months and an average of approximately 10 months. ner using current policies and technologies. Most zero-day attacks affect few hosts, with the exception of a few Most zero-day vulnerabilities are employed in tar- high-profile attacks (e.g., Stuxnet). geted attacks. 58% of the anti-virus signatures are still active at the time of writing. Data covering 4 years is not sufficient for observing all the phases in the vulnerability lifecycle. After zero-day vulnerabilities are disclosed, the number of malware The public disclosure of vulnerabilities is followed variants exploiting them increases 183–85,000 times and the number by an increase of up to five orders of magnitude in of attacks increases 2–100,000 times. the volume of attacks. Exploits for 42% of all vulnerabilities employed in host-based threats Cyber criminals watch closely the disclosure of new are detected in field data within 30 days after the disclosure date. vulnerabilities, in order to start exploiting them. in cyber security [25]. WINE includes field data collected by vulnerabilities are disclosed, the volume of attacks exploit- Symantec on 11 million hosts around the world. These hosts ing them increases by up to 5 orders of magnitude. do not represent honeypots or machines in an artificial lab These findings have important technology and policy im- environment; they are real computers that are targeted by plications. The challenges for identifying and analyzing elu- cyber attacks. For example, the binary reputation data set sive threats, such as zero-day attacks, emphasize that ex- includes information on binary executables downloaded by periments and empirical studies in cyber security must be users who opt in for Symantec’s reputation-based security conducted at scale by taking advantage of the resources that program (which assigns a reputation score to binaries that are available for this purpose, such as the WINE platform. are not known to be either benign or malicious). The anti- This will allow researchers and practitioners to investigate virus telemetry data set includes reports about host-based mitigation techniques for these threats based on empirical threats (e.g., viruses, worms, trojans) detected by Syman- data rather than on anecdotes and back-of-the-envelope cal- tec’s anti-virus products. culations. For example, the fact that zero-day attacks are The key idea behind our technique is to identify exe- rare events, but that the new exploits are re-used for multi- cutable files that are linked to exploits of known vulnerabil- ple targeted attacks, suggests that techniques for assigning ities. We start from the public information about disclosed reputation based on the prevalence of files [9] can reduce the vulnerabilities (i.e., vulnerabilities that have been assigned a effectiveness of the exploit. Furthermore, because we quan- CVE identifier [10]), available from vulnerability databases tify the increase in the volume of attacks after vulnerability and vendor advisories. We use the public Threat Explorer disclosures, we provide new data for assessing the overall web site [38] to determine threats identified by Symantec benefit to society of the full disclosure policy, which calls for that are linked to these vulnerabilities, and then we query disclosing new vulnerabilities publicly, even if patches are the anti-virus telemetry data set in WINE for the hashes not yet available. of all the distinct files (malware variants) that are detected We make three contributions in this paper: by these signatures. Finally, we search the history of binary reputation submissions for these malicious files, which allows • We propose a method for identifying zero-day attacks us to estimate when and where they appeared on the In- from data collected on real hosts and made available ternet. Correlating these independently-collected data sets to the research community via the WINE platform. allows us to study all the phases in the vulnerability life- • We conduct a systematic study of the characteristics cycle. For example, when we find records for the presence of zero-day attacks. Our findings are summarized in of a malicious executable in the wild before the correspond- Table 1. ing vulnerability was disclosed, we have identified a zero-day attack. • We compare the impact of zero-day vulnerabilities be- To the best of our knowledge, this represents the first at- fore and after their public disclosure, and we discuss tempt to measure the prevalence and duration of zero-day the implications for the policy of full disclosure. attacks, as well as the impact of vulnerability disclosure on the volume of attacks observed. We identify 18 vulnera- The remainder of the paper is organized as follows. In bilities exploited in the real-world before disclosure. Out Section 2 we define zero-day attacks and we state our goals of these 18 vulnerabilities, 11 were not previously known to in this paper. In Section 3 we review the current knowledge have been employed in zero-day attacks, which suggests that about zero-day attacks. In Section 4 we describe our method zero-day attacks are more common than previously thought. for identifying zero-day attacks automatically and the data A typical zero-day attack lasts on average 312 days and hits sets analyzed. In Section 5 we present our empirical results, multiple targets around the world; however, some of these and in Section 6 we discuss the implications of our findings. attacks remain unknown for up to 2.5 years. After these
  • 3. 2. PROBLEM STATEMENT AND GOALS The Common Vulnerabilities and Exposures (CVE) consor- tium maintains a database with extensive information about vulnerabilities, including technical details and the disclosure dates, that is a widely accepted standard for academia, gov- ernmental organizations and the cyber security industry [10]. tv te td t0 ts tp ta For CVE, a vulnerability is a software mistake that allows Zero day attack Follow-on attacks attackers execute commands as other users, access data that Window of exposure has access restrictions, behave as another user or launch de- nial of service attack. In general, a zero-day attack is an attack that exploits vulnerabilities not yet disclosed to the Figure 2: Attack timeline. These events do not al- public. This is only one phase in the lifecycle of these vul- ways occur in this order, but ta > tp ≥ td > tv and nerabilities (see Figure 1). A security vulnerability starts t0 ≥ td . The relation between td and te cannot be 5 as a programming bug that evades testing. Cyber criminals determined in most cases. For a zero-day attack sometimes discover the vulnerabily, exploit it, and package t0 > t e . the exploit with a malicious payload to conduct zero-day attacks against selected targets. After the vulnerability or the exploits are discovered by the security community and rums and mailing lists. A CVE identifier (e.g., CVE- described in a public advisory, the vendor of the affected 2010-2568) is assigned to the vulnerability (time = t0 ). software releases a patch for the vulnerability and security vendors update anti-virus signatures to detect the exploit • Anti-virus signatures released. Once the vulnera- or the specific attacks. However, the exploit is then reused, bility is disclosed, anti-virus vendors release new signa- and in some cases additional exploits are created based on tures for ongoing attacks and created heuristic detec- the patch [7], for attacks on a larger scale, targeting Internet tions for the exploit. After this point, the attacks can hosts that have not yet applied the patch. The race between be detected on end-hosts with updated A/V signatures these attacks and the remediation measures introduced by (time = ts ). the security community can continue for several years, until the vulnerability ceases to affect end-hosts. • Patch released. On the disclosure date, or shortly The following events mark this lifecycle (Figure 2): afterward, the software vendor releases a patch for the vulnerability. After this point, the hosts that have ap- • Vulnerability introduced. A bug (e.g., program- plied the patch are no longer susceptible to the exploit ming mistake, memory mismanagement) is introduced (time = tp ). in software that is later released and deployed on hosts • Patch deployment completed. All vulnerable around the world (time = tv ). hosts worldwide are patched and the vulnerability ceases to have an impact (time = ta ). • Exploit released in the wild. Actors in the un- derground economy discover the vulnerability, create A zero-day attack is characterized by a vulnerability that is a working exploit and use it to conduct stealth attacks exploited in the wild before it is disclosed, i.e., t0 > te . Sim- against selected targets (time = te ). ilarly, a zero-day vulnerability is vulnerability employed in a zero-day attack. Our goals in this paper are to measure the • Vulnerability discovered by the vendor. The prevalence and duration of zero-day attacks and to compare vendor learns about the vulnerability (either by dis- the impact of zero-day vulnerabilities before and after t0 . covering it through testing or from a third-party re- Software vendors fix bugs and patch vulnerabilities in all port), assesses its severity, assigns a priority for fixing their product releases, and as a result some vulnerabilities it and starts working on a patch (time = td ). are never exploited or disclosed. In this paper, we only con- sider vulnerabilities that have been assigned a CVE identi- • Vulnerability disclosed publicly. The vulnerabil- fier. Similarly, in some cases vendors learn about a vulnera- ity is disclosed, either by the vendor or on public fo- bility before it is exploited, but consider it low priority, and cyber criminals may also delay the release of exploits until they identify a suitable target, to prevent the discovery of Exploit Zero-Day the vulnerability. While the CVE database sometimes indi- Attacks cates when vulnerabilities were reported to the vendors, it is Vulnerability Follow-on generally impossible to determine the exact date when the Attacks vendor or the cyber criminals discovered the vulnerability or even which discovery came first. We therefore consider Dissemination & Concealment the disclosure date of the vulnerability as “day zero,” the Remediation end of the zero-day attack. Moreover, some exploits are not Patch employed for malicious activities before the disclosure date and are disseminated as proofs-of-concept, to help the soft- A/V Signatures ware vendor understand the vulnerability and the anti-virus vendors update their signatures. When disclosed vulnera- bilities are left unpatched, this creates an opportunity for Figure 1: Lifecycle of zero-day vulnerabilities. cyber criminals to create additional exploits and to conduct
  • 4. attacks on a larger scale; however, these attacks can usu- bilities continue to be exploited even after patches become ally be detected by an anti-virus program with up-to-date available [3]. Frei compared how fast Microsoft and Apple definitions. In this paper, we consider only exploits that react to newly disclosed vulnerabilities and, while significant have been used in real-world attacks before the correspond- differences exist between the two vendors, both have some ing vulnerabilities were disclosed. vulnerabilities with no patch available 180 days after disclo- sure [12]. A Secunia study showed that 50% of Windows Non-goals. We do not aim to analyze the techniques used users were exposed to 297 vulnerabilities in a year and that to exploit zero-day vulnerabilities or for packing the mal- patches for only 65% of these vulnerabilities were available ware to avoid detection. We therefore focus on data that at the time of their public disclosure [13]. Moreover, even highlights the presence and propagation rate of malware on after patches become available, users often delay their de- the Internet, rather than on the static or behavioral analysis ployment, partly because of the overhead of patch manage- of the malware samples. The motivations behind zero-day ment and partly because of the general observation that the attacks, the dynamics of the market for zero-day vulnera- process of fixing bugs tends to introduce additional software bilities and the attacks against disclosed vulnerabilities for defects. For example, a typical Windows user must manage which patches are not available are also outside the scope of 14 update mechanisms to keep the host fully patched [13], this study. while an empirical study suggested that over 10% of security patches have bugs of their own [5]. 3. RELATED WORK While the market for zero-day vulnerabilities has not been studied as thoroughly as other aspects of the underground Frei studied zero-day attacks by combining publicly avail- economy, the development of exploits for such vulnerabilities able information on vulnerabilities disclosed between 2000– is certainly a profitable activity. For example, several secu- 2007 with a study of three exploit archives, popular in the rity firms run programs, such as HP’s Zero Day Initiative hacker community [12]. This study showed that, on the and Verisign’s iDefense Vulnerability Contributor Program, disclosure date, an exploit was available for 15% of vulnera- that pay developers up to $10,000 for their exploits [15, 20], bilities and a patch was available for 43% of vulnerabilities with the purpose of developing intrusion-protection filters (these percentages are not directly comparable because they against these exploits. Between 2000–2007, 10% of vulner- are computed over different bases—all vulnerabilities that abilities have been disclosed through these programs [12]. have known exploits and all vulnerabilities that have been Similarly, software vendors often reward the discovery of new patched, respectively). The study also found that 94% of ex- vulnerabilities in their products, offering prizes up to $60,000 ploits are created within 30 days after disclosure. However, for exploits against targets that are difficult to attack, such the exploits included in public archives are proofs-of-concept as Google’s Chrome browser [14]. Moreover, certain firms that are not always used in real-world attacks. Shahzad et and developers specialize in selling exploits to confidential al. conduct a similar study, but on a larger data set [32]. clients on the secretive, but legal, market for zero-day vul- In this work, the authors analyze how the type and number nerabilities. Industry sources suggest that the market value of vulnerabilities change during the period of their analysis of such vulnerabilities can reach $250,000 [15, 20]. In par- window. McQueen et al. [18] analyze the lifespan of known ticular, the price of exploits against popular platforms, such zero-day vulnerabilities in order to be able to estimate the as Windows, iOS or the major web browsers, may exceed real number of zero-day vulnerabilities existed in the past. $100,000, depending on the complexity of the exploit and In contrast to this previous work, we analyze field data, col- on how long the vulnerability remains undisclosed [15]. lected on real hosts targeted by cyber attacks, to understand the prevalence and duration of zero-day attacks before vul- nerabilities are disclosed, and we conduct a real-world anal- 4. IDENTIFYING ZERO-DAY ATTACKS ysis rather than make statistical estimations. Symantec analysts identified 8–15 zero-day vulnerabilities AUTOMATICALLY each year between 2006–2011 [37]. For example, 9 vulnera- To identify zero-day attacks automatically, we analyze the bilities were used in zero-day attacks in 2008, 12 in 2009, 14 historical information provided by multiple data sets. In in 2010 and 8 in 2011. The 14 zero-day vulnerabilities dis- this section, we describe our data sets and the ground truth covered in 2010 affected the Windows operating system, as for our analysis (§4.1). We then introduce our method for well as widely used applications such as Internet Explorer, identifying zero-day attacks (§4.2) and discuss the threats Adobe Reader, and Adobe Flash Player. These vulnerabil- to the validity of our findings (§4.3). ities were employed in high-profile attacks, such as Stuxnet and Hydraq. In 2009, Qualys analysts reported knowledge of 4.1 Data sets 56 zero-day vulnerabilities [24]. In contrast, to these reports, We conduct our study on the Worldwide Intelligence Net- we propose a technique for identifying zero-day attacks au- work Environment (WINE), a platform for data intensive tomatically from field data available to the research commu- experiments in cyber security [25]. WINE was developed nity, and we conduct a systematic study of zero-day attacks at Symantec Research Labs for sharing comprehensive field in the real world. In particular, we identify 11 vulnerabili- data with the research community. WINE samples and ag- ties, disclosed between 2008–2011, that were not known to gregates multiple terabyte-size data sets, which Symantec have been used in a zero-day attack. uses in its day-to-day operations, with the aim of support- Most prior work has focused on the entire window of ex- ing open-ended experiments at scale. The data included in posure to a vulnerability (see Figure 2), first defined by WINE is collected on a representative subset of the hosts Schneier [29]. Arbaugh et al. evaluated the number of running Symantec products, such as the Norton Antivirus. intrusions observed during each phase of the vulnerability These hosts do not represent honeypots or machines in an lifecycle and showed that a significant number of vulnera- artificial lab environment; they are real computers, in active
  • 5. “W32.Stuxnet” CVE id Threat Explorer OSVDB (public virus descriptions) virus id Anti-virus telemetry (virus detections) Dynamic analysis file hash results hash of Binary reputation dropped file (file downloads) Timestamp, MD5, host count, etc. Figure 3: Overview of our method for identifying zero-day attacks systematically. use around the world, that are targeted by cyber attacks. In this paper, we analyze two WINE data sets: anti-virus WINE also enables the reproduction of prior experimental telemetry and binary reputation. The anti-virus telemetry results, by archiving the reference data sets that researchers data records detections of known threats for which Symantec use and by recording information on the data collection pro- generated a signature that was subsequently deployed in an cess and on the experimental procedures employed. anti-virus product. The anti-virus telemetry data in WINE We correlate the WINE data sets with information from was collected between December 2009 and August 2011, and three additional sources: the Open Source Vulnerability it includes 225 million detections that occurred on 9 million Database (OSVDB) [21], Symantec’s Threat Explorer [38], hosts. From each record, we use the detection time, the and a Symantec data set with dynamic analysis results for associated threat label, the hash (MD5 and SHA2) of the malware samples. While we process the data provided by malicious file, and the country where the machine resides. OSVDB and Symantec Threat Explorer for forming the ba- We use this data in two ways: first, to link the threat labels sis of our ground truth, we analyze WINE and the dynamic with malicious files, and second, to enrich our knowledge analysis results, in a further stage, to identify the zero-day about the impact of zero-day vulnerabilities after they are attacks. publicly disclosed. OSVDB is a public database that aggregates all the avail- The binary reputation data, on the other hand, does not able sources of information about vulnerabilities that have record threat detections. Instead, it reports all the binary been disclosed since 1998. Because the Microsoft Windows executables—whether benign or malicious—that have been platform has been the main target for cyber attacks over downloaded on end-hosts around the world. The binary rep- the past decade, we focus on vulnerabilities in Windows utation data in WINE was collected since February 2008, or in software developed for Windows. The information and it includes 32 billion reports about approximately 300 we collected from OSVDB includes the discovery, disclo- million distinct files, which were downloaded on 11 million sure and exploit release date of the vulnerabilities. To com- hosts. Each report includes the download time, the hash plete the picture of the vulnerability lifecycle, we collect the (MD5 and SHA2) of the binary, and the URL from which patch release dates from Microsoft and Adobe Security Bul- it was downloaded These files may include malicious bina- letins [1, 19]. ries that were not detected at the time of their download Threat Explorer is a public web site with up-to-date in- because the threat was unknown. We note that this data is formation about the latest threats, risks and vulnerabilities. collected only from the Symantec customers who gave their In addition, it provides detailed historical information about consent to share it. The binary reputation data allows us to most threats for which Symantec has generated anti-virus look back in time to get more insights about what happened signatures. From these details, we are only interested in the before signatures for malicious binaries were created. There- malware class of the threat (e.g., Trojan, Virus, Worm), the fore, analyzing this data set enables us to discover zero-day signature generation date and associated CVE identifier(s), attacks conducted in the past. if the threat exploits known vulnerabilities. We build the In the recent years, most exploits are embedded in non- ground truth of this study by combining information from executable files such as *.pdf, *.doc, *.xlsx [39]. Because OSVDB and Symantec Threat Explorer to prepare a list of the binary reputation data only reports executable files, it threats along with the vulnerabilities they exploit. is not straightforward to find out whether a non-executable
  • 6. exploit was involved in a zero-day attack or not. To ana- Analyzing the presence of exploits on the Internet. lyze non-executable exploits, we try to identify a customized Having identified which executables exploit known cve id s, malicious binary that was downloaded after a successful ex- we search for each executable in the binary reputation data ploitation, and we then search the binary in the binary rep- to estimate when they first appeared on the Internet. Be- utation data. To this end, we search the dynamic analysis cause the binary reputation data indicates the presence of data set to create a list of binaries that are downloaded after these files, and not whether they were executed (or even if the exploitation phase. they could have executed on the platform where they were discovered), these reports indicate attacks rather than suc- cessful infections. As some virus id s match more than one 4.2 Method for identifying zero-day attacks variant, the first executable detected marks the start of the Figure 3 illustrates our analysis method, which has five attack. After this step, for each virus id in Z we can approx- steps: building the ground truth, identifying exploits in exe- imate the time when the attack started in the real world. cutables, identifying executables dropped after exploitation Identifying zero-day attacks. Finally, to find the (optional phase), analyzing the presence of exploits on the virus id s involved in zero-day attacks we compare the start Internet, and identifying zero-day attacks. dates of each attack with the disclosure dates of the corre- Building the ground truth. We first gather information sponding vulnerabilities. If at least one of the file hash id s about vulnerabilities in Windows and in software running on of a threat Zi = {virus idi , cve idi } was downloaded be- the Windows platform by querying OSVDB and other ref- fore the disclosure date of cve idi , we conclude that cve idi erences about disclosed vulnerabilities (e.g., Microsoft Bul- is a zero-day vulnerability and that virus idi performed a letins). For all the vulnerabilities that are identified by a zero-day attack. CVE number we collect the discovery, disclosure, exploit re- lease date and patch release dates. We then search Syman- 4.3 Threats to validity tec’s Threat Explorer for these CVE numbers to identify the The biggest threat to the validity of our results is selec- threats that exploit these vulnerabilities. Each threat has a tion bias. As WINE does not include data from hosts with- name (e.g., W32.Stuxnet) and a numerical identifier, called out Symantec’s anti-virus products, our results may not be virus id. We manually filter out the virus id s that corre- representative of the general population of platforms in the spond to generic virus detections (e.g., “Trojan Horse”), as world. In particular, users who install anti-virus software identified by their Threat Explorer descriptions [38]. This might be more careful with the security of their computers step results in a mapping of threats to their corresponding and, therefore, might be less exposed to attacks. Although CVE identifiers, Zi = {virus idi , cve idi }, which are our we cannot rule out the possibility of selection bias, the large candidates for the zero-day attack study. Note that some size of the population in our study (11 million hosts and virus id s use more than one vulnerability, therefore in Zi it 300 million files) and the amount of zero-day vulnerabilities is possible to observe the same virus id more than once. we identify using our automated method (18, which is on the same order of magnitude as the 31 reported by Syman- Identifying exploits in executables. In the second stage tec analysts during the same period [37]) suggest that our our aim is to identify the exploits that are detected by each results have a broad applicability. virus id in Z so that we can search for them in the binary Moreover, for the zero-day vulnerabilities detected toward reputation data. The anti-virus telemetry data set records the beginning of our data collection period, we may underes- the hashes of all the malicious files identified by Symantec’s timate the duration of the attacks. We therefore caution the anti-virus products. We represent each file recorded in the reader that our results for the duration of zero-day attack system with an identifier (file hash id ). Certain virus id s are best interpreted as lower bounds. detect a large number of file hash id s because of the poly- morphism employed by malware authors to evade detection. This step results in a mapping of threats to their variants, Ei = {virus idi , f ile hash idi }. 5. ANALYSIS RESULTS AND FINDINGS In this section, we analyze the zero-day vulnerabilities we Identifying executables dropped after exploitation. discover with the method described in Section 4. We build When exploits are embedded in non-executable files, we can our ground truth starting from a January 2012 copy of the find their file hash id s in the anti-virus telemetry data but OSVDB database. The binary reputation data we analyze not in the binary reputation data. To detect zero-day at- was collected between February 2008 and March 2012. As tacks that employ such exploits, we query the dynamic anal- this is the key component of our method, we can only iden- ysis data set for files that are downloaded after successful ex- tify zero-day attacks that occurred between 2008 and 2011. ploitations performed by the file hash id s identified in the We first apply our method without the optional step that previous step. This step also produces a mapping of threats takes into account the dynamic analysis data. As shown to malicious files, but instead of listing the exploit files in in Table 2, we identify 18 zero-day vulnerabilities: 3 dis- E we add the dropped binary files. This may result in false closed in 2008, 7 in 2009, 6 in 2010 and 2 in 2011. The sec- positives because, even if we detect a dropped executable in ond column of the table lists the anti-virus signatures linked the binary reputation data before the disclosure date of the to these vulnerabilities; the signatures are described on the corresponding vulnerability, we cannot be confident that this Threat Explorer web site [38]. While the exploit files asso- executable was linked to a zero-day attack. In other words, ciated with most vulnerabilities were detected by only one the executable may have been downloaded using other in- anti-virus signature—typically a heuristic detection for the fection techniques. Therefore, this step is optional in our exploit—there are some vulnerabilities associated with sev- method. eral signatures. For example, CVE-2008-4250 was exploited
  • 7. Table 2: The 0-day vulnerabilities identified by our automated method. Public Hosts 0-day vulnerability Anti-virus signatures Disclosure Attack Start Variants Exploit targeted Date Date Release CVE-2008-0015 Bloodhoud.Exploit.259 2009-07-06 Not known 2008-12-28 1 2 CVE-2008-2249 Bloodhound.Exploit.214 2008-12-09 Not known 2008-10-14 1 1 W32.Downadup W32.Downadup.B CVE-2008-4250 W32.Fujacks.CE 2008-10-23 2008-10-23 2008-02-05 312 450 K W32.Neeris.C W32.Wapomi.B CVE-2009-0084 Bloodhound.Exploit.238 2009-04-14 Not known 2008-10-23 3 3 CVE-2009-0561 Bloodhound.Exploit.251 2009-06-09 Not known 2009-01-11 1 1 CVE-2009-0658 Trojan.Pidief 2009-02-20 Not known 2008-09-02 7 23 CVE-2009-1134 Bloodhound.Exploit.254 2009-06-09 Not known 2008-07-25 1 20 K CVE-2009-2501 Bloodhoud.Exploit.277 2009-10-13 Not known 2009-01-07 6 12 CVE-2009-3126 Bloodhound.Exploit.278 2009-10-13 Not known 2009-01-27 6 16 CVE-2009-4324 Trojan.Pidief.H 2009-12-14 2009-12-15 2009-03-15 1 3 CVE-2010-0028 Bloodhound.Exploit.314 2010-02-10 Not known 2008-10-14 127 102 CVE-2010-0480 Bloodhound.Exploit.324 2010-04-14 Not known 2010-03-26 1 1 CVE-2010-1241 Bloodhound.Exploit.293 2010-04-11 Not known 2008-11-29 2 3 Bloodhound.Exploit.343 CVE-2010-2568 W32.Stuxnet 2010-07-17 2010-07-18 2008-02-13 3597 1.5 M W32.Changeup.C W32.Ramnit CVE-2010-2862 Bloodhound.Exploit.353 2010-08-04 Not known 2009-03-05 4 18 CVE-2010-2883 Bloodhound.Exploit.357 2010-09-08 2010-09-07 2008-12-14 2 18 CVE-2011-0618 Bloodhound.Exploit.412 2011-05-13 Not known 2010-01-03 1 1 CVE-2011-1331 Trojan.Tarodrop.L 2011-06-16 Not known 2009-03-19 13 32 8 months before the disclosure date by Conficker (also known abilities (see Table 3). For example, CVE-2010-2568 is one as W32.Downadup) [23] and four other worms. of the four zero-day vulnerabilities exploited by Stuxnet and The third column of the table lists the disclosure date it is known to have also been employed by another threat for of these vulnerabilities, and the fifth column lists the ear- more than 2 years before the disclosure date (17 July 2010). liest occurrence, observable in WINE, of a file exploiting As shown in Table 3, most of these vulnerabilities affected them. For these vulnerabilities, exploits were active in the Microsoft and Adobe products. real world before disclosure, which indicates that they are The zero-day attacks we identify lasted between 19 days zero-day vulnerabilities. For comparison, in the fourth col- (CVE-2010-0480) and 30 months (CVE-2010-2568), and the umn of Table 2 we also report the exploit release dates, as average duration of a zero-day attack is 312 days. Figure 4 recorded in public vulnerability databases such as OSVDB. also illustrates this distribution. The last column in Table 2 This information is available for only 4 out of the 18 vul- shows the number of hosts targeted before the zero-day at- nerabilities and in all these cases the exploit release date is tacks was detected. 15 of the zero-day vulnerabilities tar- within one day of the vulnerability disclosure, while working geted fewer than 1,000 hosts, out of the 11 million hosts in exploits existed in the wild 8–30 months before disclosure. our data set. On the other hand, 3 vulnerabilities were em- This emphasizes the importance of analyzing field data when ployed in attacks that infected thousands or even millions studying zero-day attacks. of Internet users. For example, Conficker exploiting the vul- To determine whether these vulnerabilities were already nerability CVE-2008-4250 managed to infect approximately known to have been involved in zero-day attacks, we manu- 370 thousand machines without being detected over more ally search all 18 vulnerabilities on Google. From the annual than two months. This example illustrates the effectiveness vulnerability trends reports produced by Symantec [33–37] of zero-day vulnerabilities for conducting stealth cyber at- and the SANS Institute [28], as well as blog posts on the tacks. topic of zero-day vulnerabilities, we found out that 7 of our We also ask the question whether the zero-day vulnera- vulnerabilities are generally accepted to be zero-day vulner- bilities continued to be exploited up until the end of our ex-
  • 8. Table 3: New 0-day vulnerabilities discovered and their descriptions. 0-day vulnerability New 0-day Description CVE-2008-0015 Microsoft ATL Remote Code Executiong Vulnerabilitiy (RCEV) CVE-2008-2249 Yes Microsoft Windows GDI WMF Integer Overflow Vulnerability CVE-2008-4250 Yes Windows Server Service NetPathCanonicalize() Vulnerability CVE-2009-0084 Yes Microsoft DirectX DirectShow MJPEG Video Decompression RCEV CVE-2009-0561 Yes Microsoft Excel Malformed Record Object Integer Overflow CVE-2009-0658 Adobe Acrobat and Reader PDF File Handling JBIG2 Image RCEV CVE-2009-1134 Yes Microsoft Office Excel QSIR Record Pointer Corruption Vulnerability CVE-2009-2501 Microsoft GDI+ PNG File Processing RCEV CVE-2009-3126 Yes Microsoft GDI+ PNG File Integer Overflow RCEV CVE-2009-4324 Adobe Reader and Acrobat newplayer() JavaScript Method RCEV CVE-2010-0028 Yes Microsoft Paint JPEG Image Processing Integer Overflow CVE-2010-0480 Yes Microsoft Windows MPEG Layer-3 Audio Decoder Buffer Overflow Vulnerability CVE-2010-1241 Yes NITRO Web Gallery ’PictureId’ Parameter SQL Injection Vulnerability CVE-2010-2568 Microsoft Windows Shortcut ’LNK/PIF’ Files Automatic File Execution Vulnerability CVE-2010-2862 Yes Adobe Acrobat and Reader Font Parsing RCEV CVE-2010-2883 Adobe Reader ’CoolType.dll’ TTF Font RCEV CVE-2011-0618 Yes Adobe Flash Player ActionScript VM Remote Integer Overflow Vulnerability CVE-2011-1331 JustSystems Ichitaro Remote Heap Buffer Overflow Vulnerability Vulnerabilities 4 3 2011 vulnerabilities q q CVE-2010-1241 CVE-2010-0028 CVE-2011-0618 CVE-2010-2862 2010 vulnerabilities q q q q qq qq q 2 CVE-2009-0561 CVE-2011-1331 CVE-2008-0015 CVE-2010-2568 CVE-2009-0084 2009 vulnerabilities q q q qq q q CVE-2009-0658 CVE-2009-3126 CVE-2008-4250 1 CVE-2009-4324 CVE-2009-1134 2008 vulnerabilities q qq qq q CVE-2010-0480 CVE-2008-2249 CVE-2009-2501 PDF CVE-2010-2883 0 20% 40% 60% 80% 100% Percentage of time active after disclosure -30 -24 -18 -12 -6 t0 Duration of zero-day attacks [months] Figure 5: Percentage of the period after the dis- Figure 4: Duration of zero-day attacks. The his- closure date that zero-day vulnerabilities are still tograms group attack durations in 3-month incre- exploited. Each dot corresponds to an antivirus sig- ments, before disclosure, and the red rug indicates nature. 100% means that a vulnerability exploit was the attack duration for each zero-day vulnerability. still in use at the time of writing. data covering 4 years is not sufficient for observing all the perimentation period. Figure 5 shows the distribution of the phases in the vulnerability lifecycle (Figure 1). time that we continue to detect anti-virus signatures linked While linking exploits to dropped executables through the to these vulnerabilities, expressed as a percentage of the dynamic analysis of malware samples may produce false pos- time between disclosure and the time of writing. The figure itives, we repeat our experiments taking this data set into suggests that zero-day vulnerabilities do not loose their pop- account, to see if we can identify more zero-day vulnerabil- ularity after the disclosure date. While two vulnerabilities, ities. We do not detect additional zero-day attacks in this CVE-2009-1134 and CVE-2009-2501, ceased to have an im- manner, but this optional step allows us to confirm 2 of the pact after being exploited over a year, 58% of the anti-virus zero-day vulnerabilities that we have already discovered. signatures are still active at the time of writing. Because of this high fraction of vulnerabilities still in use, it would be 5.1 Zero-day vulnerabilities after disclosure meaningless to compute the half-life or the decay of the vul- To learn what happens after the disclosure of zero-day vul- nerability usage. The only conclusion we can draw is that nerabilities, we investigate the volume of attacks exploiting
  • 9. CVE-2009-4324 Malware variants 100000 Attacks CVE-2009-4324 CVE-2009-0658 100000 CVE-2010-2568 CVE-2010-0028 CVE-2008-4250 CVE-2009-0084 CVE-2009-0084 CVE-2010-1241 10000 10000 CVE-2010-2862 CVE-2010-0480 CVE-2009-0561 1000 1000 CVE-2010-2883 CVE-2009-3126 CVE-2008-2249 CVE-2009-2501 CVE-2008-0015 100 100 CVE-2010-0028 10 -2883 10 CVE-2010 CVE-2011-1331 CVE-2009-1134 1 1 -60 -40 -20 t0 20 40 60 80 -100 -50 t0 50 100 150 Time [weeks] Time [weeks] (a) Attacks exploiting zero-day vulnerabilities before and after the (b) Malware variants exploiting zero-day vulnerabilities disclosure (time = t0 ). before and after disclosure (time = t0 ). Figure 6: Impact of vulnerability disclosures on the volume of attacks. We utilize logarithmic scales to illustrate an increase of several orders of magnitude after disclosure. Vulnerabilities these vulnerabilities over time. Specifically, we analyze the 60 variation of the number of malware variants, as they emerge in the wild, and of the number of times they are detected. Figure 6a shows how many downloads (before the disclo- 50 sure date) and detections (after the disclosure date) of the exploits for the zero-day vulnerabilities were observed until 40 the last exploitation attempt. The number of attacks in- creases 2–100,000 times after the disclosure dates of these 30 vulnerabilities. Figure 6b shows that the number of variants (files exploit- 20 ing the vulnerability) exhibits the same abrupt increase after disclosure: 183–85,000 more variants are detected each day. 10 One reason for observing large number of new different files that exploit the zero-day vulnerabilities might be that they 0 are repacked versions of the same exploits. However, it is t0 doubtful that repacking alone can account for an increase 6 12 18 24 30 by up to 5 orders of magnitude. More likely, this increase is Time to exploit [months] the result of the extensive re-use of field-proven exploits in other malware. Figure 7: Time before vulnerabilities disclosed be- Figure 7 shows the time elapsed until all the vulnerabilities tween 2008–2011 started being exploited in the field. disclosed between 2008 and 2011 started being exploited in The histograms group the exploitation lag in 3- the wild. Exploits for 42% of these vulnerabilities appear in month increments, after disclosure, and the red rug the field data within 30 days after the disclosure date. This indicates the lag for each exploited vulnerability. illustrates the fact that the cyber criminals watch closely the The zero-day attacks are excluded from this figure. disclosure of new vulnerabilities, in order to start exploiting them, which causes a significant risk for end-users. to identify on average 8 known zero-day vulnerabilities per year. 5.2 Other Zero-day Vulnerabilities To understand the reasons why our method missed 24 Every year, Symantec analysts prepare an “Internet Secu- zero-day vulnerabilities reported in ISTR, we performed a rity Threats Report” (ISTR) in which new threats, vulner- manual analysis on their characteristics, such as being em- abilities and malware trends are reported. This report in- ployed in highly targeted attacks, applying polymorphism cludes information about the zero-day vulnerabilities iden- etc. This study highlights the limitations of our method: tified during the previous year. These reports identify 31 between 2008–2011: 9 in 2008, 12 in 2009, 14 in 2010 and • Web Attacks: anti-virus telemetry only records de- 8 in 2011 [33–37]. For each year, our automated method tections of host-based attacks. To detect web-based at- discovers on average 3 zero-day vulnerabilities that were not tacks, e.g. cross-site scripting attacks, we would need known before and on average 2 zero-day vulnerabilities from to analyze network based intrusion-detection data. the list reported by Symantec. However, we were not able While telemetry from Symantec’s intrusion detection
  • 10. products is included in WINE, we did not consider of cyber attacks. Automated methods for finding zero-day this data set in our study because it is not straightfor- attacks in field data, such as the method we propose in this ward to correlate it with the binary reputation data. paper, facilitate the systematic study of these threats. For Our method did not detect CVE-2011-2107, CVE-2011- example, our method allows us to measure the duration of 3765, etc. because these vulnerabilities are exploited zero-day attacks (Figure 4). While the average duration is in web attacks. approximately 10 months, the fact that all but one of the vulnerabilities disclosed after 2010 remained unknown for • Polymorphic malware: another limitation of our more than 16 months suggests that we may be underesti- method is that, if the exploit files created for the zero- mating the duration of zero-day attacks, as the data we an- day vulnerabilities are polymorphic, the file hashes alyze goes back only to February 2008. In the future, such may be different in the anti-virus telemetry in binary automated techniques will allow analysts to detect zero-day reputation data. Most of the zero-day exploits that attacks faster, e.g., when a new exploit is reused in mul- we could not identify were polymorphic, for example, tiple targeted attacks. However, this will require establish- CVE-2010-0806, CVE-2010-3654, CVE-2009-1537. ing mechanisms for organizations to share information about • Non-executable exploits: In recent years, exploits suspected targeted attacks with the security community. tend to be embedded in non-executable files such as Our findings also provide new data for the debate on the pdf, doc, xlsx. Symantec’s anti-virus products pro- benefits of the full disclosure policy. This policy is based vide detections for such malware, and the anti-virus on the premise that disclosing vulnerabilities to the public, telemetry data contains records for detections of non- rather than to the vendor, is the best way to fix them be- executable files. However, the binary reputation data cause this provides an incentive for vendors to patch faster, only tracks binary files. Because we use the binary rather than to rely on security-through-obscurity [29]. This reputation data to approximate the start dates of at- debate is ongoing [2, 6, 30, 31], but most participants agree tacks, we cannot detect zero-day vulnerabilities that that disclosing vulnerabilities causes an increase in the vol- are exploited by non-executable files. One workaround ume of attacks. Indeed, this is what the supporters of full we considered was to link exploits in non-executable disclosure are counting on, to provide a meaningful incentive files with the executable dropped once the exploit is for patching. However, the participants to the debate dis- successful, by establishing correlations through dy- agree about whether trading off a high volume of attacks for namic analysis results. Unfortunately, results for non- faster patching provides an overall benefit to the society. For executable files were available only starting in late example, Schneier initiated the debate by suggesting that, to 2011 (i.e., almost the end of the period covered in our mitigate the risk of disclosure, we should either patch all the study). Therefore, the dynamic analysis data set pro- vulnerable hosts as soon as the fix becomes available, or we vided limited benefits. A representative example for should limit the information available about the vulnerabil- vulnerabilities that we could not detect due to non- ity [29]. Ozmet et al. concluded that disclosing information executable files problem is CVE-2011-0609, which was about vulnerabilities improves system security [22], while exploited in RSA attack [27]. Rescorla et al. could not find the same strong evidence on a more limited data set [26]. Arora et al. [4] and Cavusoglu et • Targeted attacks: zero-day vulnerabilities are usu- al. [8] analyzed the impact of full disclosure using techniques ally exploited in targeted attacks [37]. Because these inspired from game theory, and they reached opposite con- attacks target a limited number of organizations, clusions about whether patches would immediately follow which hold sensitive information than can be stolen, the disclosure of vulnerabilities. most consumers are not exposed to these attacks. Even The root cause of these disagreements lies in the difficulty though we analyze binary reputation data collected on of quantifying the real-world impact of vulnerability disclo- 11 million hosts, this may not be is not sufficient for sures and of patch releases without analyzing comprehensive identifying zero-day attacks that are highly targeted. field data. We take a first step toward this goal by show- ing that the disclosure of zero-day vulnerabilities causes a 6. DISCUSSION significant risk for end-users, as the volume of attacks in- creases by up to 5 orders of magnitude. However, vendors Zero-day attacks are difficult to prevent because they ex- prioritize which vulnerabilities they patch, giving more ur- ploit unknown vulnerabilities, for which there are no patches gency to vulnerabilities that are disclosed or about to be and no anti-virus or intrusion-detection signatures. It seems disclosed. For example, 80% of the 2007 vulnerabilities were that, as long as software will have bugs and the development discovered more than 30 days before the disclosure date [12]. of exploits for new vulnerabilities will be a profitable activ- Moreover, even after patches become available users often ity, we will be exposed to zero-day attacks. In fact, 60% delay their deployment, e.g., because a typical Windows user of the zero-day vulnerabilities we identify in our study were must manage 14 update mechanisms to keep the host fully not known before, which suggests that there are many more patched [13]. At the same time, anecdotal evidence suggests zero-day attacks than previously thought—perhaps more that attackers also adapt their strategies to the expected than twice as many. However, reputation-based technolo- disclosure of zero-day vulnerabilities. For example, the 2004 gies, which assign a score to each file based on its prevalence Witty worm was released less than 48 hours after the vulner- in the wild and on a number of other inputs [9], single out ability it exploited was disclosed, which raised the suspicion rare events such as zero-day attacks and can reduce the ef- that the attacker did not utilize a working exploit until the fectiveness of the exploits. deployment of the patch was imminent [40]; the exploit file The large fraction of new zero-day vulnerabilities we iden- used in the 2011 attack against RSA was sent to 15 different tify also emphasizes that zero-day attacks are difficult to organizations in the two weeks leading to the vulnerability’s detect through manual analysis, given the current volume
  • 11. disclosure, in an attempt to exploit is as much as possible patch availability - an empirical analysis. In Workshop before it was discovered and patched [17]. This is because on the Economics of Information Security (WEIS early disclosure reduces the value of zero-day vulnerabilities; 2004), 2004. for example, some fees for new exploits are paid in install- [5] S. Beattie, S. Arnold, C. Cowan, P. Wagle, and ments, with each subsequent payment depending on the lack C. Wright. Timing the application of security patches of a patch [15]. Additional research is needed for quanti- for optimal uptime. In Large Installation System fying these aspects of the full disclosure trade-off, e.g., by Administration Conference, pages 233–242, measuring how quickly vulnerable hosts are patched in the Philadelphia, PA, Nov 2002. field, following vulnerability disclosures. Like our study of [6] J. Bollinger. Economies of disclosure. In SIGCAS zero-day attacks, answering these additional research ques- Comput. Soc., 2004. tions will require empirical studies conducted at scale, using [7] D. Brumley, P. Poosankam, D. X. Song, and J. Zheng. comprehensive field data. Automatic patch-based exploit generation is possible: Techniques and implications. In IEEE Symposium on 7. CONCLUSION Security and Privacy, pages 143–157, Oakland, CA, Zero-day attacks have been discussed for decades, but no May 2008. study has yet measured the duration and prevalence of these [8] H. C. H. Cavusoglu and S. Raghunathan. Emerging attacks in the real world, before the disclosure of the corre- issues in responsible vulnerability disclosure. In sponding vulnerabilities. We take a first step in this direc- Workshop on Information Technology and Systems, tion by analyzing field data collected on 11 million Windows 2004. hosts over a period of 4 years. The key idea in our study [9] D. H. P. Chau, C. Nachenberg, J. Wilhelm, A. Wright, is to identify executable files that are linked to exploits of and C. Faloutsos. Polonium : Tera-scale graph mining known vulnerabilities. By searching for these files in a data for malware detection. In SIAM International set with historical records of files downloaded on end-hosts Conference on Data Mining (SDM), Mesa, AZ, April around the world, we systematically identify zero-day at- 2011. tacks and we analyze their evolution in time. [10] CVE. A dictionary of publicly known information We identify 18 vulnerabilities exploited in the wild before security vulnerabilities and exposures. their disclosure, of which 11 were not previously known to http://cve.mitre.org/, 2012. have been employed in zero-day attacks. Zero-day attacks [11] N. Falliere, L. O’Murchu, and E. Chien. W32.stuxnet last on average 312 days, and up to 30 months, and they dossier. http://www.symantec.com/content/en/us/ typically affect few hosts. However, there are some excep- enterprise/media/security_response/ tions for high profile attacks such as Conficker and Stuxnet, whitepapers/w32_stuxnet_dossier.pdf, February which we respectively detected on hundreds of thousands 2011. and millions of the hosts in our study, before the vulnera- [12] S. Frei. Security Econometrics: The Dynamics of bility disclosure. After the disclosure of zero-day vulnera- (In)Security. PhD thesis, ETH Z¨rich, 2009. u bilities, the volume of attacks exploiting them increases by [13] S. Frei. End-Point Security Failures, Insight gained up to 5 orders of magnitude. These findings have important from Secunia PSI scans. Predict Workshop, February implications for future security technologies and for public 2011. policy. [14] Google Inc. Pwnium: rewards for exploits, February 2012. http://blog.chromium.org/2012/02/ Acknowledgments pwnium-rewards-for-exploits.html. We thank Jonathan McCune and Michael Hicks for stimu- [15] A. Greenberg. Shopping for zero-days: A price list for lating discussions on the topic of zero-day attacks. We also hackers’ secret software exploits. Forbes, 23 March thank Marc Dacier for his early feedback on our results, and 2012. http://www.forbes.com/sites/ the anonymous CCS reviewers for their constructive feed- andygreenberg/2012/03/23/ back. Finally, this research would not have been possible shopping-for-zero-days-an-price-list-for-hackers-secret-so without the WINE platform, built and made available to [16] A. Lelli. The Trojan.Hydraq incident: Analysis of the the research community by Symantec. Our results can be Aurora 0-day exploit. reproduced by utilizing the reference data set WINE 2012- http://www.symantec.com/connect/blogs/ 003, archived in the WINE infrastructure. trojanhydraq-incident-analysis-aurora-0-day-exploit, 25 January 2010. 8. REFERENCES [17] R. McMillan. RSA spearphish attack may have hit US [1] Adobe Systems Incorporated. Security bulletins and defense organizations. PC World, 8 September 2011. advisories. http://www.pcworld.com/businesscenter/article/ http://www.adobe.com/support/security/, 2012. 239728/rsa_spearphish_attack_may_have_hit_us_ [2] R. Anderson and T. Moore. The economics of defense_organizations.html. information security. In Science, vol. 314, no. 5799, [18] M. A. McQueen, T. A. McQueen, W. F. Boyer, and 2006. M. R. Chaffin. Empirical estimates and observations [3] W. A. Arbaugh, W. L. Fithen, and J. McHugh. of 0day vulnerabilities. In Hawaii International Windows of vulnerability: A case study analysis. Conference on System Sciences, 2009. IEEE Computer, 33(12), December 2000. [19] Microsoft. Microsoft security bulletins. http:// [4] A. Arora, R. Krishnan, A. Nandkumar, R. Telang, technet.microsoft.com/en-us/security/bulletin, and Y. Yang. Impact of vulnerability disclosure and 2012.
  • 12. [20] C. Miller. The legitimate vulnerability market: Inside [38] Symantec Corporation. Symantec threat explorer. the secretive world of 0-day exploit sales. In Workshop http://www.symantec.com/security_response/ on the Economics of Information Security, Pittsburgh, threatexplorer/azlisting.jsp, 2012. PA, June 2007. [39] Symantec.cloud. February 2011 intelligence report. [21] OSVDB. The open source vulnerability database. http://www.messagelabs.com/mlireport/MLI_2011_ http://www.osvdb.org/, 2012. 02_February_FINAL-en.PDF, 2011. [22] A. Ozment and S. E. Schechter. Milk or wine: does [40] N. Weaver and D. Ellis. Reflections on Witty: software security improve with age? In 15th Analyzing the attacker. ;login: The USENIX conference on USENIX Security Symposium, 2006. Magazine, 29(3):34–37, June 2004. [23] P. Porras, H. Saidi, and V. Yegneswaran. An anlysis of conficker’s logic and rendezvous points. http://mtc.sri.com/Conficker/, 2009. [24] Qualys, Inc. The laws of vulnerabilities 2.0. http://www.qualys.com/docs/Laws_2.0.pdf, July 2009. [25] T. Dumitraș and D. Shou. Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE). In EuroSys BADGERS Workshop, Salzburg, Austria, Apr 2011. [26] E. Rescorla. Is finding security holes a good idea? In IEEE Security and Privacy, 2005. [27] U. Rivner. Anatomy of an attack, 1 April 2011. http: //blogs.rsa.com/rivner/anatomy-of-an-attack/ Retrieved on 19 April 2012. [28] SANS Institute. Top cyber security risks - zero-day vulnerability trends. http://www.sans.org/ top-cyber-security-risks/zero-day.php, 2009. [29] B. Schneier. Cryptogram september 2000 - full disclosure and the window of exposure. http://www.schneier.com/crypto-gram-0009.html, 2000. [30] B. Schneier. Locks and full disclosure. In IEEE Security and Privacy, 2003. [31] B. Schneier. The nonsecurity of secrecy. In Commun. ACM, 2004. [32] M. Shahzad, M. Z. Shafiq, and A. X. Liu. A large scale exploratory analysis of software vulnerability life cycles. In Proceedings of the 2012 International Conference on Software Engineering, 2012. [33] Symantec Corporation. Symantec global Internet security threat report, volume 13. http://eval.symantec.com/mktginfo/enterprise/ white_papers/b-whitepaper_internet_security_ threat_report_xiii_04-2008.en-us.pdf, April 2008. [34] Symantec Corporation. Symantec global Internet security threat report, volume 14. http://eval.symantec.com/mktginfo/enterprise/ white_papers/b-whitepaper_internet_security_ threat_report_xv_04-2010.en-us.pdf, April 2009. [35] Symantec Corporation. Symantec global Internet security threat report, volume 15. http://msisac. cisecurity.org/resources/reports/documents/ SymantecInternetSecurityThreatReport2010.pdf, April 2010. [36] Symantec Corporation. Symantec Internet security threat report, volume 16, April 2011. [37] Symantec Corporation. Symantec Internet security threat report, volume 17. http://www.symantec.com/threatreport/, April 2012.