FCScan: A New Lightweight and Effective Approach for Detecting Malicious Content in Electronic Documents

作者: C. Schade

DOI:

关键词: MalwareAdobeMicrosoft OfficeWorld Wide WebEngineeringReplicateComputer security

摘要: Electronic documents, such as PDF and Microsoft Office have become an ubiquitous attack vector in recent years, especially complex attacks performed by Advanced Persistent Threats. Current security measures are not effective protecting users endpoints, either because they based on static checks analysis that attackers can bypass circumvent, or require CPUintensive is usually off-loaded external systems, which cannot replicate all of the actual parameters intended victim. We present a lightweight system perform detection malware electronic documents real-time at endpoint. To show effectiveness our approach, we implemented tested prototype Adobe Acrobat Reader.

参考文章(43)
Ulrich Bayer, Christopher Kruegel, Engin Kirda, TTAnalyze: A Tool for Analyzing Malware Proceedings of the European Institute for Computer Antivirus Research Annual Conference,2006. ,(2006)
Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, Li Xie, DROP: Detecting Return-Oriented Programming Malicious Code international conference on information systems security. ,vol. 5905, pp. 163- 177 ,(2009) , 10.1007/978-3-642-10772-6_13
Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn, NOZZLE: a defense against heap-spraying code injection attacks usenix security symposium. pp. 169- 186 ,(2009)
George Mohay, Andrew Clark, Stig Andersson, Network-Based Buffer Overflow Detection by Exploit Code Analysis AusCERT 2004 Asia Pacific Information Technology Security Conference Proceedings R&D Stream. ,(2004)
Navjot Singh, Arash Baratloo, Timothy Tsai, Transparent run-time defense against stack smashing attacks usenix annual technical conference. pp. 21- 21 ,(2000)
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Farooq, Embedded Malware Detection Using Markov n-Grams international conference on detection of intrusions and malware and vulnerability assessment. pp. 88- 107 ,(2008) , 10.1007/978-3-540-70542-0_5
Asia Slowinska, Herbert Bos, Traian Stancescu, Body armor for binaries: preventing buffer overflows without recompilation usenix annual technical conference. pp. 11- 11 ,(2012) , 10.5555/2342821.2342832
Ron Kohavi, A study of cross-validation and bootstrap for accuracy estimation and model selection international joint conference on artificial intelligence. ,vol. 2, pp. 1137- 1143 ,(1995)
Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda, Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks Detection of Intrusions and Malware, and Vulnerability Assessment. pp. 88- 106 ,(2009) , 10.1007/978-3-642-02918-9_6
Periklis Akritidis, Cling: A memory allocator to mitigate dangling pointers usenix security symposium. pp. 12- 12 ,(2010)