Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security 2007
DOI: 10.1145/1229285.1229291
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing network traffic to detect self-decrypting exploit code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
50
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(51 citation statements)
references
References 11 publications
1
50
0
Order By: Relevance
“…Zhang et al [31] proposed another emulator to detect polymorphic shellcode. In addition, they use a static analysis method to identify the start point of polymorphic shellcode which is potentially faster than [23].…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al [31] proposed another emulator to detect polymorphic shellcode. In addition, they use a static analysis method to identify the start point of polymorphic shellcode which is potentially faster than [23].…”
Section: Related Workmentioning
confidence: 99%
“…Dynamic code analysis using network-level emulation [22] is not hindered by such obfuscations, and thus can detect even extensively obfuscated shellcodes but is currently able to detect only self-contained polymorphic shellcode. Zhang et al [35] propose to combine network-level emulation with static and data flow analysis for improving runtime detection performance. However, the proposed method requires the presence of a decryption loop in the shellcode, and thus will miss any polymorphic shellcodes that use unrolled loops or linear code, such as those presented in Sec.…”
Section: Related Workmentioning
confidence: 99%
“…However, recent advances in shellcode development have demonstrated that in certain cases, it is possible to construct a polymorphic shellcode which i) does not rely on any form of GetPC code, and ii) does not read its own memory addresses during the decryption process. A shellcode that uses either or both of these features will thus evade current network-level emulation approaches [22,35]. In the following, we describe examples of both cases.…”
Section: Non-self-contained Polymorphic Shellcodementioning
confidence: 99%
“…Zhang et al [164] introduce a detection technique for polymorphic code through static identification of its self-decryption functionality. Limited emulation of instructions is used in conjunction with recursive traversal of loops to find the starting location of the respective routine.…”
Section: Malware Analysis Solutionsmentioning
confidence: 99%