STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis
نویسندگان
چکیده
Despite considerable effort, buffer overflow attacks remain a major security threat today, especially when coupled with self-propagation mechanisms as in worms and viruses. This paper considers the problem of designing networklevel mechanisms for detecting polymorphic instances of such attacks. The starting point for our work is the observation that many buffer overflow attacks require a “sled” component to transfer control of the system to the exploit code. While previous work has shown that it is possible to detect certain types of sleds, including obfuscated instances, this paper demonstrates that the proposed detection heuristics can be thwarted by more elaborate sled obfuscation techniques. To address this problem, we have designed a new sled detection heuristic, called STRIDE, that offers three main improvements over previous work: it detects several types of sleds that other techniques are blind to, has a lower rate of false positives, and is significantly more computationally efficient, and hence more suitable for use at the network-level.
منابع مشابه
Effects of resisted sled towing on sprint kinematics in field-sport athletes.
Weighted sled towing is a common resisted sprint training technique even though relatively little is known about the effects that such practice has on sprint kinematics. The purpose of this study was to explore the effects of sled towing on acceleration sprint kinematics in field-sport athletes. Twenty men completed a series of sprints without resistance and with loads equating to 12.6 and 32.2...
متن کاملMolecular diversity within and between Ajowan (Carum copticum L.) populations based on inter simple sequence repeat (ISSR) markers
Study of genetic relationships is a prerequisite for plant breeding activities as well as for conservation of genetic resources. In the present study, genetic diversity among and within 15 Iranian native Ajowan(Carum copticum L.) populations were determined using inter simple sequence repeat (ISSR) markers. Twelve selected primers produced 153 discernible bands, with 93 (60.78%) being ...
متن کاملOn the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection
Polymorphic malcode remains one of the most troubling threats for information security and intrusion defense systems. The ability for malcode to be automatically transformed into to a semantically equivalent variant frustrates attempts to construct a single, simple, easily verifiable representation. We present a quantitative analysis of the strengths and limitations of shellcode polymorphism an...
متن کاملInstruction Usage in Evolving Polymorphic Viruses
1 This research sponsored under grant F96-F154000-000NC, Office of Research and Development, CIA. Maria is an undergraduate (Junior) pursuing a BSEE in the Department of Electrical Engineering. Her research mentored by Dr. Wee, under the Women’s Engineering Link Mentorship program. Dr. Matt Bishop is her faculty sponsor. Christopher is a post-doctoral researcher in the Computer Security Laborat...
متن کاملReal-world Polymorphic Attack Detection
As state-of-the-art attack detection technology becomes more prevalent, attackers have started to employ evasion techniques such as code obfuscation and polymorphism to defeat existing defenses. We have recently proposed network-level emulation, a heuristic detection method that scans network traffic to detect polymorphic attacks. Our approach uses a CPU emulator to dynamically analyze every po...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005