首页> 外文会议>International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment >Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks
【24h】

Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks

机译:X86可执行文件静态分析,防止自动模拟攻击

获取原文

摘要

In 2005, Kruegel et al. proposed a variation of the traditional mimicry attack, to which we will refer to as automatic mimicry, which can defeat existing system call based HIDS models. We show how such an attack can be defeated by using information provided by the Interprocedural Control Flow Graph (ICFG). Roughly speaking, by exploiting the ICFG of a protected binary, we propose a strategy based on the use of static analysis techniques which is able to localize critical regions inside a program, which are segments of code that could be used for exploiting an automatic mimicry attack. Once the critical regions have been recognized, their code is instrumented in such a way that, during the executions of such regions, the integrity of the dangerous code pointers is monitored, and any unauthorized modification will be restored at once with the legal values. Moreover, our experiments shows that such a defensive mechanism presents a low run-time overhead.
机译:2005年,Kruegel等人。提出了传统的MIMICRY攻击的变化,我们将参考自动模拟物,这可以击败现有的基于系统呼叫的HIDS模型。我们展示了如何通过使用通过中移交控制流程图(ICFG)提供的信息来击败这样的攻击。粗略地通过利用受保护二进制的ICFG来说,我们提出了一种基于使用静态分析技术的策略,该技术能够本地化程序内部的关键区域,这是可以用于利用自动模拟攻击的代码的段。一旦识别出关键区域,它们的代码就是这样的方式,即在这样的区域的执行期间,监视危险代码指针的完整性,并且任何未经授权的修改将一次与法律值一次恢复。此外,我们的实验表明,这种防御机制呈现低运行时间开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号