首页> 外文会议>2010 Proceedings IEEE INFOCOM >Malicious Shellcode Detection with Virtual Memory Snapshots
【24h】

Malicious Shellcode Detection with Virtual Memory Snapshots

机译:使用虚拟内存快照进行恶意Shellcode检测

获取原文

摘要

Malicious shellcodes are segments of binary code disguised as normal input data. Such shellcodes can be injected into a target process's virtual memory. They overwrite the process's return addresses and hijack control flow. Detecting and filtering out such shellcodes is vital to prevent damage. In this paper, we propose a new malicious shellcode detection methodology in which we take snapshots of the process's virtual memory before input data are consumed, and feed the snapshots to a malicious shellcode detector. These snapshots are used to instantiate a runtime environment that emulates the target process's input data consumption to monitor shellcodes' behaviors. The snapshots can also be used to examine the system calls that shellcodes invoke, these system call parameters, and the process's execution flow. We implement a prototype system in Debian Linux with kernel version 2.6.26. Our extensive experiments with real traces and thousands of malicious shellcodes illustrate our system's performance with low overhead and few false negatives and few false positives.
机译:恶意shellcode是伪装成正常输入数据的二进制代码段。可以将此类shellcode注入目标进程的虚拟内存中。它们将覆盖进程的返回地址并劫持控制流。检测并过滤掉此类shellcode对于防止损坏至关重要。在本文中,我们提出了一种新的恶意Shellcode检测方法,在该方法中,我们在消耗输入数据之前为进程的虚拟内存创建快照,并将快照馈送到恶意Shellcode检测器。这些快照用于实例化运行时环境,该环境模拟目标进程的输入数据消耗以监视shellcode的行为。快照还可以用于检查shellcode调用的系统调用,这些系统调用参数以及进程的执行流程。我们在Debian Linux中使用内核版本2.6.26实现了一个原型系统。我们对真实的痕迹和数千个恶意shellcode进行了广泛的实验,以较低的开销,极少的误报和极少的误报说明了我们系统的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号