作者: Michael Valkering , Asia Slowinska , Herbert Bos
DOI: 10.1007/978-0-387-85555-4_1
关键词:
摘要: Paradoxically, encryption makes it hard to detect, fingerprint and stop exploits. We describe Hassle, a honeypot capable of detecting fingerprinting monomorphic polymorphic attacks on encrypted channels. It uses dynamic taint analysis in an emulator detect attacks, tags each tainted byte memory with pointer its origin the corresponding network trace. Upon attack, we correlate blocks trace generate various types signature. As correlation data is difficult, retaint connections, making point decrypted instead.