首页> 外文学位 >Capturing and analyzing Internet worms.
【24h】

Capturing and analyzing Internet worms.

机译:捕获和分析Internet蠕虫。

获取原文
获取原文并翻译 | 示例

摘要

This document is about malware analysis, with a particular focus on exploit-based Internet worms that spread from one host to another over the network by exploiting a software vulnerability in the new host being attacked. Based on our experiences analyzing real worms that use this method of worm propagation we develop a model that divides this attack into three stages: the exploit vector (epsilon) where the machine being attacked is still running its vulnerable code, the bogus control data (gamma) that is the part of the attack that is directly involved in control flow hijacking, and the payload (pi) where the worm code is being executed instead of the code of the attacked system.; The Epsilon-Gamma-Pi model will be defined more formally in Chapter 3. In this document the particular focus will be on control data attacks, but the model generalizes to hijacking of control flow at any level of abstraction. What we will show in this dissertation is that malware analysis put into the context of the Epsilon-Gamma-Pi model can take advantage of various limitations placed on the worm at each of the stages. Researchers and malware analysis professionals can benefit greatly from an understanding of the differences between the stages in terms of the adversarial model, the polymorphic and metamorphic techniques to evade signature detection, and the amount of information about the threat that can be discovered in a particular stage. Three specific examples are described in detail: Minos, an architectural mechanism to catch control data attacks in the gamma stage; DACODA, a tool to analyze attack invariants that limit polymorphism in the epsilon stage; and Temporal Search, a method to analyze the pi stage and discover timebomb attacks in a worm's payload.
机译:本文档是关于恶意软件分析的,特别关注基于漏洞利用的Internet蠕虫,该蠕虫通过利用被攻击的新主机中的软件漏洞从网络上的一台主机传播到另一台主机。根据我们对使用这种蠕虫传播方法的真实蠕虫进行分析的经验,我们开发了将这种攻击分为三个阶段的模型:被攻击机器仍在运行其易受攻击的代码的漏洞利用向量(epsilon),伪造控制数据(gamma) ),这是直接与控制流劫持有关的攻击的一部分,以及执行蠕虫代码(而不是被攻击系统的代码)的有效负载(pi)。 Epsilon-Gamma-Pi模型将在第3章中更正式地定义。在本文档中,重点将放在控制数据攻击上,但是该模型可以概括为在任何抽象级别上劫持控制流。我们将在本文中展示的是,在Epsilon-Gamma-Pi模型的上下文中进行的恶意软件分析可以利用在每个阶段对蠕虫的各种限制。研究人员和恶意软件分析专业人员可以从以下方面的理解中受益匪浅:对抗模型,规避签名检测的多态和变态技术以及可以在特定阶段发现的有关威胁的信息量。详细描述了三个具体示例:Minos,一种在gamma阶段捕获控制数据攻击的体系结构机制; DACODA,一种分析在ε阶段限制多态性的攻击不变量的工具;和时间搜索,一种分析pi阶段并发现蠕虫有效载荷中的定时炸弹攻击的方法。

著录项

  • 作者

    Crandall, Jedidiah Richard.;

  • 作者单位

    University of California, Davis.;

  • 授予单位 University of California, Davis.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2007
  • 页码 145 p.
  • 总页数 145
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号