A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter
Author(s) -
Jinchang Hu,
Jinfu Chen,
Sher Ali,
Bo Liu,
Jingyi Chen,
Chi Zhang,
Jian Yang
Publication year - 2021
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0114
pISSN - 1939-0122
DOI - 10.1155/2021/5581274
Subject(s) - exploit , computer science , vulnerability (computing) , vulnerability management , software , control flow graph , control flow , jump , software security assurance , computer security , vulnerability assessment , information security , theoretical computer science , psychology , physics , quantum mechanics , psychological resilience , security service , psychotherapist , programming language
With the wide application of software system, software vulnerability has become a major risk in computer security. +e on-time detection and proper repair for possible software vulnerabilities are of great importance in maintaining system security and decreasing system crashes. +e Control Flow Integrity (CFI) can be used to detect the exploit by some researchers. In this paper, we propose an improved Control Flow Graph with Jump (JCFG) based on CFI and develop a novel Vulnerability Exploit Detection Method based on JCFG (JCFG-VEDM). +e detection method of the exploit program is realized based on the analysis results of the exploit program. +en the JCFG is addressed through combining the features of the exploit program and the jump instruction. Finally, we implement JCFG-VEDM and conduct the experiments to verify the effectiveness of the proposed method. +e experimental results show that the proposed detection method (JCFG-VEDM) is feasible and effective.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom