Execution of multiple execution paths

作者: Clemens Kolbitsch , Benjamin Livshits , Benjamin Goth Zorn , Christian Seifert

DOI:

关键词:

摘要: Techniques for execution of multiple paths are described. In one or more embodiments, an a portion executable code is conditioned upon particular environment-specific value. For example, the can cause type output if value variable equals value, and different discussed herein enable to be executed such that outputs produced, e.g., by executing according values variable. implementations, analyzed various attributes, as presence malware, implementation coding errors, so on.

参考文章(58)
Haowen Bai, Lingzhi Gu, Fangming Chai, Bocheng Shu, Yuqi Yang, Dan Liu, Xiao Liang, Sheng Xu, Huan Du, Yichao Li, Yue Cao, Method and system for detecting a malicious code ,(2009)
Thomas Toth, Christopher Kruegel, Accurate buffer overflow detection via abstract payload execution recent advances in intrusion detection. pp. 274- 291 ,(2002) , 10.1007/3-540-36084-0_15
Panayiotis Mavrommatis, Niels Provos, Dean McNamee, Nagendra Modadugu, Ke Wang, The ghost in the browser analysis of web-based malware conference on workshop on hot topics in understanding botnets. pp. 4- 4 ,(2007)
Matthew Van Gundy, Hao Chen, Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. network and distributed system security symposium. ,(2009)
K. G. Anagnostakis, K. Xinidis, A. D. Keromytis, E. Markatos, S. Sidiroglou, P. Akritidis, Detecting targeted attacks using shadow honeypots usenix security symposium. pp. 9- 9 ,(2005) , 10.7916/D8WM1PS8
Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn, NOZZLE: a defense against heap-spraying code injection attacks usenix security symposium. pp. 169- 186 ,(2009)
Charles M. Curtsinger, Benjamin Livshits, Benjamin Goth Zorn, Christian Seifert, Detection of code-based malware ,(2011)
P. Akritidis, E. P. Markatos, M. Polychronakis, K. Anagnostakis, STRIDE: Polymorphic Sled Detection Through Instruction Sequence Analysis information security conference. pp. 375- 391 ,(2005) , 10.1007/0-387-25660-1_25
Galen Hunt, Doug Brubacher, Detours: binary interception of Win32 functions conference on usenix windows nt symposium. pp. 14- 14 ,(1999)