Sciweavers

CCS
2015
ACM

Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths

8 years 6 months ago
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing program anomaly detection systems focusing on legal control flow attestation and short call sequence verification are inadequate to detect such stealthy attacks. In this paper, we point out the need to analyze program execution paths and discover event correlations in large-scale execution windows among millions of instructions. We propose an anomaly detection approach with two-stage machine learning algorithms to recognize diverse normal call-correlation patterns and detect program attacks at both inter- and intra-cluster levels. We implement a prototype of our approach and demonstrate its effectiveness against three real-world attacks and four synthetic anomalies with less than 0.01% false positive rates
Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan
Added 17 Apr 2016
Updated 17 Apr 2016
Type Journal
Year 2015
Where CCS
Authors Xiaokui Shu, Danfeng Yao, Naren Ramakrishnan
Comments (0)