System, apparatus and method for performing on-demand binary analysis for detecting code reuse attacks

作者: Alex Nayshtut , Ajay Harikumar , Tugrul Ince , Koichi Yamada

DOI:

关键词:

摘要: In one embodiment, a binary translator to perform translation of code is to: first analysis block determine whether second control transfer instruction included in the block, where includes return target instruction; instruction, call and store an address pair associated with whitelist if block. Other embodiments are described claimed.

参考文章(29)
Uday R. Savagaonkar, Vedvyas Shanbhogue, Ravi L. Sahita, Jason W. Brandt, Control Transfer Termination Instructions Of An Instruction Set Architecture (ISA) ,(2012)
Palanivelra Shanmugavelayutham, Arvind Krishnaswamy, Jiwei Lu, Jason M. Agron, Koichi Yamada, Techniques for detecting return-oriented programming ,(2013)
Weidong Cui, Marcus Peinado, Malware investigation by analyzing computer memory ,(2010)
Oliver Winzenried, Marcellus Buchheit, Peer Wichmann, Ruediger Kuegler, Method and system for intrusion detection ,(2007)
Shaun Noel Missett, Berkay Baykal, Michael W. Conner, Duane M. Butler, Secure dhcp processing for layer two access networks ,(2009)