Xede: Practical Exploit Early Detection

نویسندگان

  • Meining Nie
  • Purui Su
  • Qi Li
  • Zhi Wang
  • Lingyun Ying
  • Jinlong Hu
  • Dengguo Feng
چکیده

Code reuse and code injection attacks have become the popular techniques for advanced persistent threat (APT) to bypass exploit-mitigation mechanisms deployed in modern operating systems. Meanwhile, complex, benign programs such as Microsoft Office employ many advanced techniques to improve the performance. Code execution patterns generated by these techniques are surprisingly similar to exploits. This makes the practical exploit detection very challenging, especially on the Windows platform. In this paper, we propose a practical exploit early detection system called Xede to comprehensively detect code reuse and code injection attacks. Xede can effectively reduce false positives and false negatives in the exploit detection. We demonstrate the effectiveness of Xede by experimenting with exploit samples and deploying Xede on the Internet. Xede can accurately detect all types of exploits. In particular, it can capture many exploits that cannot be captured by mainstream anti-virus software and detect exploits that fail to compromise the systems due to variations in the system configurations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Capturing 0day Exploits with PERFectly Placed Hardware Traps

Advanced software exploitation is a rapidly changing field of study. In recent years, clever ways to bypass existing exploit defenses have become mainstream. Reactive defensive solutions based on known exploitation techniques have been proven ineffective, and easily circumvented. In this paper, we discuss a new system for early detection and prevention of unknown exploits. Our system uses Perfo...

متن کامل

Evaluation of Pregnancy Detection in Lori-Bakhtiari Sheep by Transrectal Ultrasonography

Objective: Various practical methods have been used for pregnancy diagnosis in sheep. Methods of pregnancy diagnosis depending on visualization of the conceptus or determination of its secretory products in the maternal blood or in the milk are the most accurate and specific methods for pregnancy. In 1980, B-mode ultrasonography was introduced in the veterinary field and used for pregnancy diag...

متن کامل

Error Detection and Recovery for Transient Faults in Elliptic Curve Cryptosystems

Faults can corrupt data in storage, in transit, or during a computation. Like other digital systems, cryptosystems are vulnerable to natural and artificial faults. However, the effects of faults on cryptosystems far suppress the corruption of data. Attacks that exploit various classes of faults to learn secret data have been proposed and shown to be practical. As such, efficient detection and r...

متن کامل

Evaluation of Pregnancy Detection in Lori-Bakhtiari Sheep by Transrectal Ultrasonography

Objective: Various practical methods have been used for pregnancy diagnosis in sheep. Methods of pregnancy diagnosis depending on visualization of the conceptus or determination of its secretory products in the maternal blood or in the milk are the most accurate and specific methods for pregnancy. In 1980, B-mode ultrasonography was introduced in the veterinary field and used for pregnancy diag...

متن کامل

The Future of Medical Imaging in the Detection of Early Markers of Disease

Imaging techniques are a combination of a contrast mechanism, exogenous or endogenous, and an instrument to exploit that contrast. This final chapter of these two special issues of this journal points to possible ways to improve the ability of imaging systems to exploit markers of cancer in the early detection of that disease. The aim not only is to find cancer at an earlier, more treatable sta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015