2022
DOI: 10.3390/electronics11203363
|View full text |Cite
|
Sign up to set email alerts
|

Horus: An Effective and Reliable Framework for Code-Reuse Exploits Detection in Data Stream

Abstract: Recent years have witnessed a rapid growth of code-reuse attacks in advance persistent threats and cyberspace crimes. Carefully crafted code-reuse exploits circumvent modern protection mechanisms and hijack the execution flow of a program to perform expected functionalities by chaining together existing codes. The sophistication and intricacy of code-reuse exploits hinder the scrutinization and dissection of them. Although the previous literature has introduced some feasible approaches, effectiveness and relia… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…This review of the existing literature on the use of ML for exploitation detection focuses on papers that use runtime traces from processors as signals. Research that uses network traffic, such as [18], [19], [20], [26] static file analysis, [21], [22], [23] is excluded from the scope of this literature review. Furthermore, research on the use of heuristic-based techniques is also excluded.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This review of the existing literature on the use of ML for exploitation detection focuses on papers that use runtime traces from processors as signals. Research that uses network traffic, such as [18], [19], [20], [26] static file analysis, [21], [22], [23] is excluded from the scope of this literature review. Furthermore, research on the use of heuristic-based techniques is also excluded.…”
Section: Related Workmentioning
confidence: 99%
“…Machine Learning (ML)-based exploitation detection research is limited in terms of quantity and content. To the best of our knowledge, we were able to find only 14 papers [13], [14], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26] that discussed the use of ML for exploitation detection. None of the 14 papers publicly presented their datasets.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation