【24h】

Hunting Trojan Horses

机译:狩猎特洛伊木马

获取原文
获取原文并翻译 | 示例

摘要

HTH (Hunting Trojan Horses) is a security framework developed for detecting difficult types of intrusions. HTH is intended as a complement to anti-virus software in that it targets unknown and zero-day Trojan Horses and Backdoors. In order to accurately identify these types of attacks HTH utilizes runtime information available during execution. The information collected includes fine-grained information flow, program execution flow and resources used.In this paper we present Harrier, an Application Security Monitor at the heart of our HTH framework. Harrier is an efficient run-time monitor that dynamically collects execution-related data. Harrier is capable of collecting information across different abstraction levels including architectural, system and library APIs. To date, Harrier is 3-4 times faster than comparable information flow tracking systems.Using the collected information, Harrier allows for accurate identification of abnormal program behavior. Preliminary resultsshow a good detection rate with a low rate of false positives.
机译: HTH(狩猎特洛伊木马)是为检测困难类型的入侵而开发的安全框架。 HTH旨在作为反病毒软件的补充,因为它针对未知的零日特洛伊木马和后门程序。为了准确识别这些类型的攻击,HTH利用了执行期间可用的运行时信息。收集的信息包括细粒度的信息流,程序执行流和使用的资源。在本文中,我们提出了 Harrier ,这是我们HTH框架核心的应用程序安全监视器。 Harrier是高效的运行时监视器,可动态收集与执行相关的数据。 Harrier能够跨不同的抽象级别收集信息,包括体系结构,系统和库API。迄今为止,Harrier的速度是同类信息流跟踪系统的3-4倍,利用收集的信息,Harrier可以准确识别异常程序行为。初步结果显示出良好的检测率和较低的误报率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号