Exploit detection based on illegal control flow transfers identification

In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of c...

Full description

Saved in:
Bibliographic Details
Main Authors: Ming-hua WANG, Ling-yun YING, Deng-guo FENG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2014-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.09.003/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539767317037056
author Ming-hua WANG
Ling-yun YING
Deng-guo FENG
author_facet Ming-hua WANG
Ling-yun YING
Deng-guo FENG
author_sort Ming-hua WANG
collection DOAJ
description In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.
format Article
id doaj-art-d3474931aebf4cc8af8dd482423487a5
institution Kabale University
issn 1000-436X
language zho
publishDate 2014-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-d3474931aebf4cc8af8dd482423487a52025-01-14T06:43:56ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-09-0135203159683940Exploit detection based on illegal control flow transfers identificationMing-hua WANGLing-yun YINGDeng-guo FENGIn order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.09.003/software vulnerabilityexploitattack detectionaddress space layout randomizationdata execution pro-tection
spellingShingle Ming-hua WANG
Ling-yun YING
Deng-guo FENG
Exploit detection based on illegal control flow transfers identification
Tongxin xuebao
software vulnerability
exploit
attack detection
address space layout randomization
data execution pro-tection
title Exploit detection based on illegal control flow transfers identification
title_full Exploit detection based on illegal control flow transfers identification
title_fullStr Exploit detection based on illegal control flow transfers identification
title_full_unstemmed Exploit detection based on illegal control flow transfers identification
title_short Exploit detection based on illegal control flow transfers identification
title_sort exploit detection based on illegal control flow transfers identification
topic software vulnerability
exploit
attack detection
address space layout randomization
data execution pro-tection
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.09.003/
work_keys_str_mv AT minghuawang exploitdetectionbasedonillegalcontrolflowtransfersidentification
AT lingyunying exploitdetectionbasedonillegalcontrolflowtransfersidentification
AT dengguofeng exploitdetectionbasedonillegalcontrolflowtransfersidentification