首页> 外文期刊>IEICE transactions on information and systems >ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets
【24h】

ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets

机译:罗托米尔:考虑ROP小工具的互联性的ROP链基于学习的静态检测

获取原文
获取外文期刊封面目录资料

摘要

Return-oriented programming (ROP) has been crucial for attackers to evade the security mechanisms of recent operating systems. Although existing ROP detection approaches mainly focus on host-based intrusion detection systems (HIDSes), network-based intrusion detection systems (NIDSes) are also desired to protect various hosts including IoT devices on the network. However, existing approaches are not enough for network-level protection due to two problems: (1) Dynamic approaches take the time with second- or minute-order on average for inspection. For applying to NIDSes, millisecond-order is required to achieve near real time detection. (2) Static approaches generate false positives because they use heuristic patterns. For applying to NIDSes, false positives should be minimized to suppress false alarms. In this paper, we propose a method for statically detecting ROP chains in malicious data by learning the target libraries (i.e., the libraries that are used for ROP gadgets). Our method accelerates its inspection by exhaustively collecting feasible ROP gadgets in the target libraries and learning them separated from the inspection step. In addition, we reduce false positives inevitable for existing static inspection by statically verifying whether a suspicious byte sequence can link properly when they are executed as a ROP chain. Experimental results showed that our method has achieved millisecond-order ROP chain detection with high precision.
机译:以返回返回的编程(ROP)对于攻击者来说至关重要,以逃避最近的操作系统的安全机制。尽管现有的ROP检测方法主要关注基于宿主的入侵检测系统(HIDSES),但也希望基于网络的入侵检测系统(NIDSES)来保护包括网络上的各种主机包括IOT设备。然而,由于两个问题,现有方法不足以适用于网络级别保护:(1)动态方法平均使用第二或分钟的时间以进行检查。要申请NIDSES,需要毫秒顺序来实现接近实时检测。 (2)静态方法产生假阳性,因为它们使用启发式模式。要申请NIDSES,应最小化误报以抑制误报。在本文中,我们通过学习目标库(即,用于ROP小工具的库)来提出一种静态检测恶意数据中的ROP链条的方法。我们的方法通过彻底收集目标库中的可行性ROP小工具并学习与检验步骤分开的可行性ROP小工具来加速其检验。此外,我们通过静态验证当作为ROP链执行时是否可以正确链接时,减少现有静态检查的假阳性。实验结果表明,我们的方法已经达到了高精度的毫秒罗特链检测。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号