Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/safe_browsing/incident_reporting/module_load_analyzer.h " | |
| 6 | |
| 7 #include "base/file_version_info.h" | |
| 8 #include "base/files/file_path.h" | |
| 9 #include "base/logging.h" | |
| 10 #include "base/metrics/histogram.h" | |
| 11 #include "base/strings/string_number_conversions.h" | |
| 12 #include "base/strings/string_util.h" | |
| 13 #include "base/strings/utf_string_conversions.h" | |
| 14 #include "chrome/browser/browser_process.h" | |
| 15 #include "chrome/browser/install_verification/win/module_info.h" | |
| 16 #include "chrome/browser/install_verification/win/module_verification_common.h" | |
| 17 #include "chrome/browser/safe_browsing/incident_reporting/incident_receiver.h" | |
| 18 #include "chrome/browser/safe_browsing/incident_reporting/suspicious_module_inci dent.h" | |
| 19 #include "chrome/browser/safe_browsing/path_sanitizer.h" | |
| 20 #include "chrome/browser/safe_browsing/safe_browsing_service.h" | |
| 21 #include "chrome/common/safe_browsing/binary_feature_extractor.h" | |
| 22 #include "chrome/common/safe_browsing/csd.pb.h" | |
| 23 #include "crypto/sha2.h" | |
| 24 | |
| 25 #if defined(SAFE_BROWSING_DB_LOCAL) | |
| 26 #include "chrome/browser/safe_browsing/local_database_manager.h" | |
| 27 #elif defined(SAFE_BROWSING_DB_REMOTE) | |
| 28 #include "chrome/browser/safe_browsing/remote_database_manager.h" | |
| 29 #endif | |
| 30 | |
| 31 namespace safe_browsing { | |
| 32 | |
| 33 // Enables incident reporting when non-whitelisted modules are found. | |
| 34 const base::Feature kIncidentReportingModuleLoadAnalysis{ | |
| 35 "IncidentReportingModuleLoadAnalysis", base::FEATURE_DISABLED_BY_DEFAULT}; | |
| 36 | |
| 37 void ModuleLoadAnalyzer::Initialize() { | |
| 38 DCHECK(database_manager_); | |
| 39 #if defined(OS_WIN) | |
| 40 if (base::FeatureList::IsEnabled(kIncidentReportingModuleLoadAnalysis)) { | |
| 41 scoped_refptr<SafeBrowsingService> safe_browsing_service( | |
| 42 g_browser_process->safe_browsing_service()); | |
| 43 | |
| 44 if (safe_browsing_service) { | |
| 45 safe_browsing_service | |
| 46 ->RegisterExtendedReportingOnlyDelayedAnalysisCallback( | |
| 47 base::Bind(&ModuleLoadAnalyzer::VerifyModuleLoadState, | |
| 48 base::Unretained(this))); | |
| 49 } | |
| 50 } | |
| 51 #endif // defined(OS_WIN) | |
| 52 } | |
| 53 | |
| 54 // Retrieves the set of suspicious modules that are loaded in the process. | |
| 55 void ModuleLoadAnalyzer::GetLoadedSuspiciousModulesOnIOThread() { | |
| 56 std::set<ModuleInfo> module_info_set; | |
| 57 base::TimeTicks start_time = base::TimeTicks::Now(); | |
| 58 scoped_ptr<std::set<base::string16>> suspicious_names( | |
| 59 new std::set<base::string16>); | |
| 60 | |
| 61 if (!GetLoadedModules(&module_info_set)) | |
| 62 return; | |
| 63 | |
| 64 std::set<ModuleInfo>::const_iterator module_iter(module_info_set.begin()); | |
| 65 for (; module_iter != module_info_set.end(); ++module_iter) { | |
| 66 base::string16 module_file_name(base::ToLowerASCII( | |
| 67 base::FilePath(module_iter->name).BaseName().value())); | |
| 68 | |
| 69 // If not whitelisted. | |
| 70 if (!database_manager_->MatchModuleWhitelistString( | |
| 71 base::UTF16ToUTF8(module_file_name))) | |
| 72 suspicious_names->insert(module_iter->name); | |
| 73 } | |
| 74 | |
| 75 UMA_HISTOGRAM_TIMES("SBIRS.SuspiciousModuleDetectionTime", | |
| 76 base::TimeTicks::Now() - start_time); | |
| 77 | |
| 78 if (!suspicious_names->empty()) { | |
| 79 scoped_refptr<base::TaskRunner> task_runner = | |
| 80 content::BrowserThread::GetBlockingPool() | |
| 81 ->GetTaskRunnerWithShutdownBehavior( | |
| 82 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN); | |
| 83 | |
| 84 task_runner->PostTask( | |
| 85 FROM_HERE, | |
| 86 base::Bind(&ModuleLoadAnalyzer::ReportIncidentsForSuspiciousModules, | |
| 87 base::Unretained(this), | |
| 88 base::Passed(std::move(suspicious_names)))); | |
| 89 } | |
| 90 } | |
| 91 | |
| 92 void ModuleLoadAnalyzer::ReportIncidentsForSuspiciousModules( | |
| 93 scoped_ptr<std::set<base::string16>> module_names) { | |
| 94 PathSanitizer path_sanitizer; | |
| 95 scoped_ptr<IncidentReceiver> incident_receiver = | |
| 96 std::move(incident_receiver_); | |
| 97 base::TimeTicks start_time = base::TimeTicks::Now(); | |
| 98 | |
| 99 UMA_HISTOGRAM_COUNTS("SBIRS.SuspiciousModuleReportCount", | |
| 100 module_names->size()); | |
| 101 | |
| 102 for (const auto& module_name : *module_names) { | |
| 103 if (abort_reporting_) | |
|
robertshield
2016/02/08 16:22:02
As discussed, if this is true, then this method is
proberge
2016/02/08 21:43:47
Done.
| |
| 104 return; | |
| 105 | |
| 106 // TODO(proberge): Skip over modules that have already been reported. | |
| 107 | |
| 108 scoped_ptr<ClientIncidentReport_IncidentData_SuspiciousModuleIncident> | |
| 109 suspicious_module( | |
| 110 new ClientIncidentReport_IncidentData_SuspiciousModuleIncident()); | |
| 111 | |
| 112 const base::FilePath module_path(module_name); | |
| 113 | |
| 114 // Sanitized path. | |
| 115 base::FilePath sanitized_path(module_path); | |
| 116 path_sanitizer.StripHomeDirectory(&sanitized_path); | |
| 117 suspicious_module->set_path(base::WideToUTF8(sanitized_path.value())); | |
| 118 | |
| 119 // Digest. | |
| 120 scoped_refptr<BinaryFeatureExtractor> binary_feature_extractor( | |
| 121 new BinaryFeatureExtractor()); | |
| 122 | |
| 123 binary_feature_extractor->ExtractDigest( | |
| 124 module_path, suspicious_module->mutable_digest()); | |
| 125 | |
| 126 // Version. | |
| 127 scoped_ptr<FileVersionInfo> version_info( | |
| 128 FileVersionInfo::CreateFileVersionInfo(module_path)); | |
| 129 if (version_info) { | |
| 130 std::wstring file_version = version_info->file_version(); | |
| 131 if (!file_version.empty()) | |
| 132 suspicious_module->set_version(base::WideToUTF8(file_version)); | |
| 133 } | |
| 134 | |
| 135 // Signature. | |
| 136 binary_feature_extractor->CheckSignature( | |
| 137 module_path, suspicious_module->mutable_signature()); | |
| 138 | |
| 139 // Image headers. | |
| 140 if (!binary_feature_extractor->ExtractImageFeatures( | |
| 141 module_path, BinaryFeatureExtractor::kDefaultOptions, | |
| 142 suspicious_module->mutable_image_headers(), | |
| 143 nullptr /* signed_data */)) { | |
| 144 suspicious_module->clear_image_headers(); | |
| 145 } | |
| 146 | |
| 147 // Send the report. | |
| 148 incident_receiver->AddIncidentForProcess(make_scoped_ptr( | |
| 149 new SuspiciousModuleIncident(std::move(suspicious_module)))); | |
| 150 } | |
| 151 | |
| 152 UMA_HISTOGRAM_TIMES("SBIRS.SuspiciousModuleReportingTime", | |
| 153 base::TimeTicks::Now() - start_time); | |
| 154 } | |
| 155 | |
| 156 void ModuleLoadAnalyzer::VerifyModuleLoadState( | |
| 157 scoped_ptr<IncidentReceiver> incident_receiver) { | |
| 158 // Shouldn't be called more than once. | |
| 159 DCHECK(!incident_receiver_); | |
| 160 incident_receiver_ = std::move(incident_receiver); | |
| 161 | |
| 162 // PostTaskAndReply doesn't work here because we're in a sequenced blocking | |
| 163 // thread pool. | |
| 164 content::BrowserThread::PostTask( | |
| 165 content::BrowserThread::IO, FROM_HERE, | |
| 166 base::Bind(&ModuleLoadAnalyzer::GetLoadedSuspiciousModulesOnIOThread, | |
| 167 base::Unretained(this))); | |
| 168 } | |
| 169 | |
| 170 } // namespace safe_browsing | |
| OLD | NEW |