OLD | NEW |
| (Empty) |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/safe_browsing/binary_integrity_analyzer.h" | |
6 | |
7 #include <string> | |
8 | |
9 #include "base/bind.h" | |
10 #include "base/callback.h" | |
11 #include "base/file_util.h" | |
12 #include "base/metrics/histogram.h" | |
13 #include "base/strings/string_number_conversions.h" | |
14 #include "base/strings/string_util.h" | |
15 #include "base/strings/stringprintf.h" | |
16 #include "base/time/time.h" | |
17 #include "chrome/browser/browser_process.h" | |
18 #include "chrome/browser/safe_browsing/binary_feature_extractor.h" | |
19 #include "chrome/browser/safe_browsing/safe_browsing_service.h" | |
20 #include "chrome/common/safe_browsing/csd.pb.h" | |
21 | |
22 namespace safe_browsing { | |
23 | |
24 namespace { | |
25 | |
26 void RecordSignatureVerificationTime(size_t file_index, | |
27 const base::TimeDelta& verification_time) { | |
28 static const char kHistogramName[] = "SBIRS.VerifyBinaryIntegrity."; | |
29 | |
30 base::HistogramBase* signature_verification_time_histogram = | |
31 base::Histogram::FactoryTimeGet( | |
32 std::string(kHistogramName) + base::IntToString(file_index), | |
33 base::TimeDelta::FromMilliseconds(1), | |
34 base::TimeDelta::FromSeconds(20), | |
35 50, | |
36 base::Histogram::kUmaTargetedHistogramFlag); | |
37 | |
38 signature_verification_time_histogram->AddTime(verification_time); | |
39 } | |
40 | |
41 } // namespace | |
42 | |
43 void RegisterBinaryIntegrityAnalysis() { | |
44 #if defined(OS_WIN) | |
45 scoped_refptr<SafeBrowsingService> safe_browsing_service( | |
46 g_browser_process->safe_browsing_service()); | |
47 | |
48 safe_browsing_service->RegisterDelayedAnalysisCallback( | |
49 base::Bind(&VerifyBinaryIntegrity)); | |
50 #endif | |
51 } | |
52 | |
53 void VerifyBinaryIntegrity(const AddIncidentCallback& callback) { | |
54 scoped_refptr<BinaryFeatureExtractor> binary_feature_extractor( | |
55 new BinaryFeatureExtractor()); | |
56 | |
57 std::vector<base::FilePath> critical_binaries = GetCriticalBinariesPath(); | |
58 for (size_t i = 0; i < critical_binaries.size(); ++i) { | |
59 base::FilePath binary_path(critical_binaries[i]); | |
60 if (!base::PathExists(binary_path)) | |
61 continue; | |
62 | |
63 scoped_ptr<ClientDownloadRequest_SignatureInfo> signature_info( | |
64 new ClientDownloadRequest_SignatureInfo()); | |
65 | |
66 base::TimeTicks time_before = base::TimeTicks::Now(); | |
67 binary_feature_extractor->CheckSignature(binary_path, signature_info.get()); | |
68 RecordSignatureVerificationTime(i, base::TimeTicks::Now() - time_before); | |
69 | |
70 // Only create a report if the signature is untrusted. | |
71 if (!signature_info->trusted()) { | |
72 scoped_ptr<ClientIncidentReport_IncidentData> incident_data( | |
73 new ClientIncidentReport_IncidentData()); | |
74 ClientIncidentReport_IncidentData_BinaryIntegrityIncident* | |
75 binary_integrity = incident_data->mutable_binary_integrity(); | |
76 | |
77 binary_integrity->set_file_basename( | |
78 binary_path.BaseName().AsUTF8Unsafe()); | |
79 binary_integrity->set_allocated_signature(signature_info.release()); | |
80 | |
81 // Send the report. | |
82 callback.Run(incident_data.Pass()); | |
83 } | |
84 } | |
85 } | |
86 | |
87 #if !defined(OS_WIN) | |
88 std::vector<base::FilePath> GetCriticalBinariesPath() { | |
89 return std::vector<base::FilePath>(); | |
90 } | |
91 #endif // !defined(OS_WIN) | |
92 | |
93 } // namespace safe_browsing | |
OLD | NEW |