SecondDEP: Resilient Computing that Prevents Shellcode Execution in Cyber-Attacks

被引:9
|
作者
Okamoto, Takeshi [1 ]
机构
[1] Kanagawa Inst Technol, Atsugi, Kanagawa 2430292, Japan
关键词
DEP; API hooking; shellcode; cyber-attack; vulnerability; Metasploit Framework; ROP;
D O I
10.1016/j.procs.2015.08.211
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a novel method of preventing shellcode execution even if DEP is bypassed. The method prevents Windows APIs from calling on a data area by API hooking, based on evidence that shellcode is executed in a data area and that the shellcode calls Windows APIs. Performance tests indicated that all samples of shellcode provided by Metasploit Framework, as well as the 18 most recent attacks using Metasploit Framework, can be detected. Comparison of this method with anti-virus products showed that this method prevented shellcode execution, whereas anti-virus products failed. Another test showed that the overhead of the method has little effect on the performance of computer operations. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:691 / 699
页数:9
相关论文
共 50 条
  • [1] Resilient Distributed Optimization Against Cyber-Attacks
    Gusrialdi, Azwirman
    Qu, Zhihua
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 3956 - 3961
  • [2] On Resilient Design of Cooperative Systems in Presence of Cyber-Attacks
    Sadabadi, Mahdieh S.
    Gusrialdi, Azwirman
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 946 - 951
  • [3] Design of Load Forecast Systems Resilient Against Cyber-Attacks
    Barreto, Carlos
    Koutsoukos, Xenofon
    DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 1 - 20
  • [4] Distributed resilient consensus on general digraphs under cyber-attacks
    Iqbal, Muhammad
    Qu, Zhihua
    Gusrialdi, Azwirman
    EUROPEAN JOURNAL OF CONTROL, 2022, 68
  • [5] Resilient Design of Leader-Follower Consensus Against Cyber-Attacks
    Sadabadi, Mahdieh S.
    Atman, Made Widhi Surya
    Aynala, Anirudh
    Gusrialdi, Azwirman
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02): : 1080 - 1092
  • [6] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [7] Resilient average consensus on general directed graphs in presence of cyber-attacks
    Sadabadi, Mahdieh S.
    Gusrialdi, Azwirman
    EUROPEAN JOURNAL OF CONTROL, 2022, 68
  • [8] Resilient Output Consensus to Cyber-Attacks in Continuous-Time Cyber-Physical Systems
    Peng, Zhaoxia
    Zhang, Yingwen
    Wen, Guoguang
    Wang, Jinhuan
    Huang, Tingwen
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (04): : 2190 - 2200
  • [9] Resilient Countermeasures Against Cyber-Attacks on Self-Driving Car Architecture
    Qurashi, Junaid M. M.
    Jambi, Kamal
    Alsolami, Fawaz
    Eassa, Fathy E. E.
    Khemakhem, Maher
    Basuhail, Abdullah
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (11) : 11514 - 11543
  • [10] Cyber-attacks and banking intermediation
    Boungou, Whelsy
    ECONOMICS LETTERS, 2023, 233