Journal on Communications ›› 2014, Vol. 35 ›› Issue (9): 20-31.doi: 10.3969/j.issn.1000-436x.2014.09.003

• PaperⅠ Network attack and Prevention • Previous Articles     Next Articles

Exploit detection based on illegal control flow transfers identification

Ming-hua WANG1,2,Ling-yun YING1,Deng-guo FENG1   

  1. 1 Laboratory of Trusted Computing and Information Assurance,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China
    2 University of Chinese Academy of Sciences,Beijing 100049,China
  • Online:2014-09-25 Published:2017-06-14
  • Supported by:
    The National Basic Research Program of China (973 Program);The National Natural Science Foundation of China;The Natural Science Foundation of Beijing

Abstract:

In order to deal with exploit attacks such as APT,an approach was proposed to detect exploits based on illegal control flow transfers identification.Both static and dynamic analysis methods were performed to construct the CFSO (control flow safety outline),which was used to restrict the targets of control flow transfers occurred during the target program's running.When a call/ret/jmp was about to execute,the target was checked according to the CFSO.The illegal control flow transfer is considered as an exploit attack and all the following attacking steps could be captured.The ex-periment also showed that proposed method had decent overhead and could be applied to detect exploits online.

Key words: software vulnerability, exploit, attack detection, address space layout randomization, data execution pro-tection

No Suggested Reading articles found!