计算机应用 ›› 2010, Vol. 30 ›› Issue (12): 3349-3353.

• 信息安全 • 上一篇    下一篇

静态检测多态溢出攻击代码的方法

卢家兴1,郭帆2,余敏1   

  1. 1.
    2. 江西省南昌市江西师范大学计算机信息工程学院
  • 收稿日期:2010-06-12 修回日期:2010-07-19 发布日期:2010-12-22 出版日期:2010-12-01
  • 通讯作者: 郭帆
  • 基金资助:
    973前期研究专项

Static detection of polymorphic attack codes

  • Received:2010-06-12 Revised:2010-07-19 Online:2010-12-22 Published:2010-12-01

摘要: 设计并实现了一套静态检测多态溢出攻击代码的方法,首先应用抽象执行思想构造控制流图,使用符号执行方法并结合Taint分析来检测攻击载荷,最后识别指定长度的填充字段来辅助检测。实验结果表明,该方法可准确识别网络数据中的多态溢出攻击代码。

关键词: 溢出攻击代码, 多态, 抽象执行, 符号执行, 无操作指令序列

Abstract: A new approach using static analysis was proposed to discover the polymorphic attack codes hidden in network data flows. The idea of abstract execution was firstly adopted to construct control flow graph, then both symbolic execution and taint analysis were used to detect attack codes, at last, predefined length of NOOP instruction sequence was recognized to help detection. The experimental results show that the approach is capable of correctly distinguishing the attack codes from regular network flows.

Key words: exploit code, polymorphic, abstract execution, symbolic execution, NOOP instruction sequence