2017
DOI: 10.1007/978-3-319-60876-1_10
|View full text |Cite
|
Sign up to set email alerts
|

Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…PROVDETECTOR, unlike virtualization based solutions [66], [62], is designed to run on bare metal machines and does not require isolated environments. Similar to previous work [27], [26], [62], to perform a large-scale analysis, we use sandbox environments to automate the execution of malware samples in our evaluation. It is possible that some anti-analysis malware changed their behavior during our evaluation.…”
Section: Mimicry Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…PROVDETECTOR, unlike virtualization based solutions [66], [62], is designed to run on bare metal machines and does not require isolated environments. Similar to previous work [27], [26], [62], to perform a large-scale analysis, we use sandbox environments to automate the execution of malware samples in our evaluation. It is possible that some anti-analysis malware changed their behavior during our evaluation.…”
Section: Mimicry Attacksmentioning
confidence: 99%
“…Bee master [27] prepares honeypot processes in an analysis environment and detects injections into the processes. Membrane [87] and Quincy [26] extract features from memory information such as memory paging information and memory dumps, and use supervised machine learning to detect code injection. Tartarus [66] and API Chaser [62] use taint tracking to identify code injection.…”
Section: Stealthy Malwarementioning
confidence: 99%
“…The first category of papers referenced the challenge to either perform an abstract comparison or highlight the importance of machine learning for malware classification in industry, where the size of data is huge [43,19,28,47,18,38,49,44,25,53,46,21,4,57,16,17,39,50]. Papers in the second category performed partial or complete evaluation on the dataset to verify the effectiveness and/or efficiency of their proposed approach for various tasks.…”
Section: Citations Comparisonmentioning
confidence: 99%
“…(1) e address of the instruction is not in the shadow memory and not in the tainted writes (line 10 Algorithm 1); (2) e address of the instruction is not in the shadow memory but in the tainted writes (line 13 Algorithm 1); (3) e address of the instruction is in the shadow memory and in the tainted writes but the content of the shadow memory is not similar to current instruction (line 16 Algorithm 1); (4) e address of the instruction is in the shadow memory and in the tainted writes and the content of the shadow memory is equivalent to the memory of the current instruction (line 18 Algorithm 1). Case (1) happens in two scenarios.…”
Section: Collecting the Execution Wavesmentioning
confidence: 99%
“…In particular, Panorama [43], DiskDuster [1], Tartarus [29] and API Chaser [25] use dynamic taint analysis to capture this. Barabosch et al has also investigated the problem with code injection by analysing memory dumps [4] and also at run time [5]. Minerva relies on the same techniques as Tartarus to trace malware execution through the system.…”
Section: Related Workmentioning
confidence: 99%