2008
DOI: 10.1007/s11416-008-0089-x
|View full text |Cite
|
Sign up to set email alerts
|

Specification and evaluation of polymorphic shellcode properties using a new temporal logic

Abstract: International audienceIt is a well-known fact that polymorphism is one of the greatest find of malicious code authors. Applied in the context of Buffer Overflow attacks, the detection of such codes becomes very difficult. In view of this problematic, which constitutes a real challenge for all the international community, we propose in this paper a new formal language (based on temporal logics such as CTL) allowing to specify polymorphic codes, to detect them and to better understand their nature. The efficienc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Although the problem of polymorphic shellcode is addressed in (e.g., [23], [24], [22]), encryption provides an almost unpreventable The proposed attack has a set of requirements, such as the existence of standard libraries and tools on the target host, to keep the shellcode as small and efficient as possible. We see the possibility to remove these requirements by implementing further functionality in the initial shellcode as well as in the different stages.…”
Section: Discussionmentioning
confidence: 99%
“…Although the problem of polymorphic shellcode is addressed in (e.g., [23], [24], [22]), encryption provides an almost unpreventable The proposed attack has a set of requirements, such as the existence of standard libraries and tools on the target host, to keep the shellcode as small and efficient as possible. We see the possibility to remove these requirements by implementing further functionality in the initial shellcode as well as in the different stages.…”
Section: Discussionmentioning
confidence: 99%
“…This intrusion detection system's management and detection function are integrated. Its size is relatively small, and it is easy to integrate with the small-scale Android platform [5,6]. Snort can capture and analysis the data packets on the network, and respond to and deal with it according to the rules defined.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…The Temporal Logic approach was used in [22] for detecting polymorphic malicious codes that exploit buffer-overflow vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%