Detecting Polymorphic Buffer Overflow Exploits with a Static Analysis Approach
Author(s) -
Fan Guo,
Jiaxing Lu,
Min Yu
Publication year - 2011
Publication title -
international journal of wireless and microwave technologies
Language(s) - English
Resource type - Journals
eISSN - 2076-9539
pISSN - 2076-1449
DOI - 10.5815/ijwmt.2011.01.03
Subject(s) - exploit , computer science , buffer overflow , control flow graph , taint checking , construct (python library) , call graph , static analysis , control flow , network security , graph , theoretical computer science , computer security , computer network , programming language , software
Remote exploit attacks are the most serious threats in network security area. Polymorphism is a kind of code-modifying technique used to evade detection. A novel approach using static analysis methods is proposed to discover the polymorphic exploit codes hiding in network data flows. The idea of abstract execution is firstly adopted to construct control flow graph, then both symbolic execution and taint analysis are used to detect exploit payloads, at last predefined length of NOOP instruction sequence is recognized to help detection. Experimental results show that the approach is capable of correctly distinguishing the exploit codes from regular network flows
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom