[go: up one dir, main page]

Shu et al., 2015 - Google Patents

Unearthing stealthy program attacks buried in extremely long execution paths

Shu et al., 2015

View PDF
Document ID
12775237638707265732
Author
Shu X
Yao D
Ramakrishnan N
Publication year
Publication venue
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security

External Links

Snippet

Modern stealthy exploits can achieve attack goals without introducing illegal control flows, eg, tampering with non-control data and waiting for the modified data to propagate and alter the control flow legally. Existing program anomaly detection systems focusing on legal …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
Shu et al. Unearthing stealthy program attacks buried in extremely long execution paths
Yang et al. {PROGRAPHER}: An anomaly detection system based on provenance graph embedding
Hadžiosmanović et al. N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
Kaur et al. A survey on zero-day polymorphic worm detection techniques
US9311476B2 (en) Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
Shu et al. Long-span program behavior modeling and attack detection
Dambra et al. Decoding the secrets of machine learning in malware classification: A deep dive into datasets, feature extraction, and model performance
Cao et al. Preemptive intrusion detection: Theoretical framework and real-world measurements
WO2009097610A1 (en) A vmm-based intrusion detection system
Chenet et al. A survey on hardware-based malware detection approaches
Thummapudi et al. Detection of ransomware attacks using processor and disk usage data
Ben Salem et al. Masquerade attack detection using a search-behavior modeling approach
Robertson et al. Effective Anomaly Detection with Scarce Training Data.
Vigna et al. Host-based intrusion detection
Alvi et al. RansomGuard: a framework for proactive detection and mitigation of cryptographic windows ransomware
Deepserish et al. PET-Droid: Android malware detection using static analysis
El-Taj et al. Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study
Garcia-Cervigon et al. Browser function calls modeling for banking malware detection
Mamalakis et al. Of daemons and men: A file system approach towards intrusion detection
Samantray et al. A theoretical feature-wise study of malware detection techniques
Zhang et al. Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM).
Gagulic et al. Ransomware detection with machine learning in storage systems
Nandal Malware Detection
Karanth et al. Pattern mining for future attacks
Čeponis Research of machine and deep learning methods application for host-level intrusion detection and classification