"Imagine a user who intends to send USD 2 to a friend through PayPal. Embedded malware in the user's laptop, however, converts the USD 2 transaction into a USD 2,000 transfer to the account of the malware author instead," researchers said.
Researchers at Georgia Tech have created a prototype software, Gyrus, that takes extra steps to prevent malware from sending spam emails and instant messages, and blocking unauthorised commands such as money transfers.
Current protection programmes might recognise the original user's intent to send email, transfer money or engage in other transactions but cannot verify the specifics such as email contents or amount of money.
"Gyrus is a transparent layer on top of the window of an application. The user experience with the application will be exactly the same as when Gyrus is not installed or activated. Of course, if Gyrus detects that user-intended data has tampered with, it will block the traffic and also notify the user," said Wenke Lee, director of the Georgia Tech Information Security Center (GTISC).
More From This Section
The research is based on the observation that for most text-based applications, the user's intent will be displayed entirely on screen, as text, and the user will make modifications if what is on screen is not what he or she wants.
"The idea of defining correct behaviour of an application by capturing user intent is not entirely new, but previous attempts in this space use an overly simplistic model of the user's behaviour," said Yeongjin Jang, the Georgia Tech PhD student who led the study.
"For example, they might infer a user's intent based on a single mouse click without capturing any associated context so the attackers can easily disguise attacks as a benign behaviour," Jang added.
There are two key components to Gyrus' approach. First, it captures the user's intent and interactions with an application.
Second, it verifies that the resulting output can be mapped back to the user's intention. As a result, the application ensures accurate transactions even in the presence of malware.