Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405)
DOI: 10.1109/secpri.2003.1199328
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection using call stack information

Abstract: The

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
236
0
1

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 240 publications
(237 citation statements)
references
References 13 publications
0
236
0
1
Order By: Relevance
“…In this paper, we use function-level scoping as the context of a waypoint. If function C calls function D, then the active context is that of D; upon function return, the active context is again that of C. Waypoints provide control flow context for security checking, which supports call flow checking approaches such as that in Feng, et al [5] and allows us to check whether the process being monitored has permission to make the requested system call in the context of the current waypoint.…”
Section: ) Execve()mentioning
confidence: 99%
See 3 more Smart Citations
“…In this paper, we use function-level scoping as the context of a waypoint. If function C calls function D, then the active context is that of D; upon function return, the active context is again that of C. Waypoints provide control flow context for security checking, which supports call flow checking approaches such as that in Feng, et al [5] and allows us to check whether the process being monitored has permission to make the requested system call in the context of the current waypoint.…”
Section: ) Execve()mentioning
confidence: 99%
“…An important characteristic that attackers use is that the default protection model permits programs to invoke any system call from any function, but in actuality each system call is only invoked from a few locations in the legal code. While some previous work has exploited the idea of binding system calls or other security sensitive events with context [5,18,[22][23][24], this paper explores this approach further. We introduce the concept of waypoints to provide trustworthy control flow information, and show how to apply the information in anomaly detection.…”
Section: Attack Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…The branch of research most related to our approach is anomaly-based application integrity checking [16,34,50,99,119], which validates application behavior from the vantage point of a secure operating system. These approaches work well when an adversary has difficulty infiltrating the host system, however, they are inappropriate for the cheating problem where the adversary owns the machine and can readily alter the operating system to disable detection tools.…”
Section: Related Workmentioning
confidence: 99%