首页> 外文会议>Advanced Communication Technology (ICACT), 2012 14th International Conference on >Survey on malware evasion techniques: State of the art and challenges
【24h】

Survey on malware evasion techniques: State of the art and challenges

机译:恶意软件规避技术调查:最新技术和挑战

获取原文
获取原文并翻译 | 示例

摘要

Nowadays targeted malware attacks against organizations are increasingly becoming more sophisticated, damaging, and difficult to detect. Current intrusion detection technologies are incapable of addressing many of the newer malware evasion techniques such as return-oriented programming and remote library injection. This paper presents a survey on the various techniques employed in malware to evade detection by security systems such as intrusion detection and anti-virus software. The evasion techniques we cover include obfuscation, fragmentation and session splicing, application specific violations, protocol violations, inserting traffic at IDS, denial of service, and code reuse attacks. We also discuss mitigations such as sandboxing, session reassembly, data execution prevention, address space layout randomization, control flow integrity, and Windows 8 ROP mitigation. We also compare evasion techniques with an analysis on the sophistication of the attack, challenges or difficulty to detect, and degree of impact.
机译:如今,针对组织的针对性恶意软件攻击正变得越来越复杂,具有破坏性且难以检测。当前的入侵检测技术无法解决许多较新的恶意软件规避技术,例如面向返回的编程和远程库注入。本文介绍了恶意软件中使用的各种技术,以逃避安全系统(例如入侵检测和防病毒软件)的检测。我们涵盖的规避技术包括混淆,分段和会话拼接,特定于应用程序的违规,协议违规,在IDS处插入流量,拒绝服务以及代码重用攻击。我们还将讨论缓解措施,例如沙箱,会话重组,数据执行保护,地址空间布局随机化,控制流完整性和Windows 8 ROP缓解措施。我们还将逃避技术与对攻击的复杂性,挑战或发现的难度以及影响程度的分析进行比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号