【24h】

Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks

机译:用于防止自动模仿攻击的x86可执行文件的静态分析

获取原文
获取原文并翻译 | 示例

摘要

In 2005, Kruegel et al. proposed a variation of the traditional mimicry attack, to which we will refer to as automatic mimicry, which can defeat existing system call based HIDS models. We show how such an attack can be defeated by using information provided by the Interprocedural Control Flow Graph (ICFG). Roughly speaking, by exploiting the ICFG of a protected binary, we propose a strategy based on the use of static analysis techniques which is able to localize critical regions inside a program, which are segments of code that could be used for exploiting an automatic mimicry attack. Once the critical regions have been recognized, their code is instrumented in such a way that, during the executions of such regions, the integrity of the dangerous code pointers is monitored, and any unauthorized modification will be restored at once with the legal values. Moreover, our experiments shows that such a defensive mechanism presents a low run-time overhead.
机译:在2005年,Kruegel等人。提出了传统模仿攻击的一种变体,我们将其称为自动模仿,它可以击败现有的基于系统调用的HIDS模型。我们展示了如何使用过程间控制流图(ICFG)提供的信息来克服这种攻击。粗略地讲,通过利用受保护二进制文件的ICFG,我们提出了一种基于静态分析技术的策略,该技术能够在程序内部定位关键区域,这些关键区域是可用于利用自动模仿攻击的代码段。 。一旦识别出关键区域,就可以对它们的代码进行检测,从而在执行这些区域期间,可以监视危险代码指针的完整性,并且可以使用合法值立即恢复任何未经授权的修改。此外,我们的实验表明,这种防御机制呈现出较低的运行时开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号