Methods, systems, and computer readable media for detecting injected machine code

作者: Fabian Monrose , Srinivas Krishnan , Kevin Snow

DOI:

关键词:

摘要: According to one aspect, the subject matter described herein includes a method for detecting injected machine code. The extracting data content from buffer. also providing an operating system kernel configured detect further executing, using kernel, on physical processor. monitoring, execution of determine whether contains code indicative injection attack.

参考文章(84)
Giampaolo Fresi Roglia, Roberto Paleari, Lorenzo Martignoni, Danilo Bruschi, A fistful of red-pills: how to automatically generate procedures to detect CPU emulators WOOT'09 Proceedings of the 3rd USENIX conference on Offensive technologies. pp. 2- 2 ,(2009)
Remzi H. Arpaci-Dusseau, Andrea C. Arpaci-Dusseau, Stephen T. Jones, Antfarm: tracking processes in a virtual machine environment usenix annual technical conference. pp. 1- 1 ,(2006)
Kostas G. Anagnostakis, Michalis Polychronakis, Evangelos P. Markatos, An empirical study of real-world polymorphic code injection attacks usenix conference on large scale exploits and emergent threats. pp. 9- 9 ,(2009)
Thomas Raffetseder, Christopher Kruegel, Engin Kirda, Detecting System Emulators Lecture Notes in Computer Science. pp. 1- 18 ,(2007) , 10.1007/978-3-540-75496-1_1
Fabian Monrose, Adam Stubblefield, Sam Small, Joshua Mason, Niels Provos, To catch a predator: a natural language approach for eliciting malicious payloads usenix security symposium. pp. 171- 183 ,(2008)
Geoff Kuenning, Ethan L. Miller, Anonymization Techniques for URLs and Filenames ,(2007)
Fabian Monrose, Lucas Ballard, Daniel Lopresti, Biometric authentication revisited: understanding the impact of wolves in sheep's clothing usenix security symposium. pp. 3- ,(2006)
F. Monrose, S. E. Coull, M. P. Collins, C. V. Wright, M. K. Reiter, On web browsing privacy in anonymized NetFlows usenix security symposium. pp. 23- ,(2007)
Benjamin Zorn, Charles Curtsinger Benjamin Livshits, Christian Seifert, Zozzle: Low-overhead Mostly Static JavaScript Malware Detection ,(2010)
Panayiotis Mavrommatis, Niels Provos, Dean McNamee, Nagendra Modadugu, Ke Wang, The ghost in the browser analysis of web-based malware conference on workshop on hot topics in understanding botnets. pp. 4- 4 ,(2007)