메뉴 건너뛰기




Volumn 5905 LNCS, Issue , 2009, Pages 163-177

DROP: Detecting return-oriented programming malicious code

Author keywords

[No Author keywords available]

Indexed keywords

ANTI VIRUS; CONTROL FLOWS; EXECUTABLES; FALSE POSITIVE; FUNCTION CALLS; INTRINSIC FEATURES; MALICIOUS CODES; MEMORY SPACE; PROGRAM DESIGN; SCANNING TECHNIQUES;

EID: 71549162538     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10772-6_13     Document Type: Conference Paper
Times cited : (124)

References (45)
  • 1
    • 71549117703 scopus 로고    scopus 로고
    • The pax project
    • The pax project (2004), http://pax.grsecurity.net/
    • (2004)
  • 2
    • 71549170628 scopus 로고    scopus 로고
    • linux/x86 execve(/bin/sh, [/bin/sh, null]). milw0rm (2006), http://www.milw0rm.com/shellcode/1635
    • linux/x86 execve("/bin/sh", ["/bin/sh", null]). milw0rm (2006), http://www.milw0rm.com/shellcode/1635
  • 3
    • 71549135971 scopus 로고    scopus 로고
    • linux/x86 execve(rm -rf /) shellcode. milw0rm (2006), http://www.milw0rm.com/shellcode/2801
    • linux/x86 execve(rm -rf /) shellcode. milw0rm (2006), http://www.milw0rm.com/shellcode/2801
  • 4
    • 71549155745 scopus 로고    scopus 로고
    • linux/x86 normal exit w/ random (so to speak) return value. milw0rm (2006), http://www.milw0rm.com/shellcode/1435
    • linux/x86 normal exit w/ random (so to speak) return value. milw0rm (2006), http://www.milw0rm.com/shellcode/1435
  • 5
    • 71549146995 scopus 로고    scopus 로고
    • linux/x86 portbind (define your own port). milw0rm (2006), http://www.milw0rm.com/shellcode/1979
    • linux/x86 portbind (define your own port). milw0rm (2006), http://www.milw0rm.com/shellcode/1979
  • 6
    • 71549120497 scopus 로고    scopus 로고
    • linux/x86 /sbin/iptables -f. milw0rm (2007), http://www.milw0rm.com/ shellcode/3445
    • linux/x86 /sbin/iptables -f. milw0rm (2007), http://www.milw0rm.com/ shellcode/3445
  • 7
    • 71549141738 scopus 로고    scopus 로고
    • linux/x86 edit /etc/sudoers for full access. milw0rm (2008), http://www.milw0rm.com/shellcode/7161
    • linux/x86 edit /etc/sudoers for full access. milw0rm (2008), http://www.milw0rm.com/shellcode/7161
  • 8
    • 71549119934 scopus 로고    scopus 로고
    • linux/x86 chmod (/etc/shadow,666) & exit(0). milw0rm (2009), http://www.milw0rm.com/shellcode/8081
    • linux/x86 chmod ("/etc/shadow",666) & exit(0). milw0rm (2009), http://www.milw0rm.com/shellcode/8081
  • 9
    • 71549127222 scopus 로고    scopus 로고
    • linux/x86 killall5 shellcode. milw0rm (2009), http://www.milw0rm.com/ shellcode/8972
    • linux/x86 killall5 shellcode. milw0rm (2009), http://www.milw0rm.com/ shellcode/8972
  • 10
    • 71549133487 scopus 로고    scopus 로고
    • linux/x86 push reboot(). milw0rm (2009), http://www.milw0rm.com/ shellcode/7808
    • linux/x86 push reboot(). milw0rm (2009), http://www.milw0rm.com/ shellcode/7808
  • 11
    • 71549129640 scopus 로고    scopus 로고
    • linux/x86 setreuid(geteuid(),geteuid()),execve(/bin/sh,0,0). milw0rm (2009), http://www.milw0rm.com/shellcode/8972
    • linux/x86 setreuid(geteuid(),geteuid()),execve("/bin/sh",0,0). milw0rm (2009), http://www.milw0rm.com/shellcode/8972
  • 22
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • USENIX Association, Berkeley
    • Kim, H.A., Karp, B.: Autograph: toward automated, distributed worm signature detection. In: Proceedings of the 13th Conference on USENIX Security Symposium, p. 19. USENIX Association, Berkeley (2004)
    • (2004) Proceedings of the 13th Conference on USENIX Security Symposium , pp. 19
    • Kim, H.A.1    Karp, B.2
  • 23
    • 71549157865 scopus 로고    scopus 로고
    • X86-64 buffer overflow exploits and the borrowed code chunks exploitation technique
    • Krahmer, S.: X86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. Phrack Magazine (2005), http://www.suse.de/krahmer/no- nx.pdf
    • (2005) Phrack Magazine
    • Krahmer, S.1
  • 24
    • 33645791274 scopus 로고    scopus 로고
    • Honeycomb: Creating intrusion detection signatures using honeypots
    • Kreibich, C., Crowcroft, J.: Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Computer Communication Review 34(1), 51-56 (2004)
    • (2004) ACM SIGCOMM Computer Communication Review , vol.34 , Issue.1 , pp. 51-56
    • Kreibich, C.1    Crowcroft, J.2
  • 28
    • 71549140754 scopus 로고    scopus 로고
    • milw0rm: http://www.milw0rm.com/shellcode/linux/x86
    • milw0rm: http://www.milw0rm.com/shellcode/linux/x86
  • 29
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits (pax case study)
    • Nergal: The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine (2001), http://www.phrack.org/archives/58/p58-0x04
    • (2001) Phrack Magazine
    • Nergal1
  • 30
    • 67650085819 scopus 로고    scopus 로고
    • Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: Proceedings of the 2007 PLDI Conference, 42(6), pp. 89-100 (2007)
    • Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: Proceedings of the 2007 PLDI Conference, vol. 42(6), pp. 89-100 (2007)
  • 35
    • 33746446345 scopus 로고    scopus 로고
    • Network-level polymorphic shellcode detection using emulation
    • Büschkes, R, Laskov, P, eds, DIMVA 2006, Springer, Heidelberg
    • Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Network-level polymorphic shellcode detection using emulation. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 54-73. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4064 , pp. 54-73
    • Polychronakis, M.1    Anagnostakis, K.G.2    Markatos, E.P.3
  • 36
    • 38149093160 scopus 로고    scopus 로고
    • Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Emulation-based detection of nonself-contained polymorphic shellcode. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 87-106. Springer, Heidelberg (2007)
    • Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Emulation-based detection of nonself-contained polymorphic shellcode. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 87-106. Springer, Heidelberg (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.