SecondDEP: Resilient Computing that Prevents Shellcode Execution in Cyber-Attacks

被引:9
|
作者
Okamoto, Takeshi [1 ]
机构
[1] Kanagawa Inst Technol, Atsugi, Kanagawa 2430292, Japan
关键词
DEP; API hooking; shellcode; cyber-attack; vulnerability; Metasploit Framework; ROP;
D O I
10.1016/j.procs.2015.08.211
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a novel method of preventing shellcode execution even if DEP is bypassed. The method prevents Windows APIs from calling on a data area by API hooking, based on evidence that shellcode is executed in a data area and that the shellcode calls Windows APIs. Performance tests indicated that all samples of shellcode provided by Metasploit Framework, as well as the 18 most recent attacks using Metasploit Framework, can be detected. Comparison of this method with anti-virus products showed that this method prevented shellcode execution, whereas anti-virus products failed. Another test showed that the overhead of the method has little effect on the performance of computer operations. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:691 / 699
页数:9
相关论文
共 50 条
  • [21] Impact Of Cyber-Attacks On Critical Infrastructure
    Thakur, Kutub
    Ali, Md Liakat
    Jiang, Ning
    Qiu, Meikang
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 183 - 186
  • [22] Cyber-Attacks in Modular Multilevel Converters
    Burgos-Mellado, Claudio
    Donoso, Felipe
    Dragicevic, Tomislav
    Cardenas-Dobson, Roberto
    Wheeler, Patrick
    Clare, Jon
    Watson, Alan
    IEEE TRANSACTIONS ON POWER ELECTRONICS, 2022, 37 (07) : 8488 - 8501
  • [23] Estimates of the macroeconomic costs of cyber-attacks
    Dieye, Rokhaya
    Bounfour, Ahmed
    Ozaygen, Altay
    Kammoun, Niaz
    RISK MANAGEMENT AND INSURANCE REVIEW, 2020, 23 (02) : 183 - 208
  • [24] Cyber-Attacks Against Transportation Infrastructure
    Gercke, Marco
    TRANSPORTATION SECURITY AGAINST TERRORISM, 2009, 54 : 151 - 161
  • [25] HARMer: Cyber-Attacks Automation and Evaluation
    Enoch, Simon Yusuf
    Huang, Zhibin
    Moon, Chun Yong
    Lee, Donghwan
    Ahn, Myung Kil
    Kim, Dong Seong
    IEEE ACCESS, 2020, 8 : 129397 - 129414
  • [26] Cyber-Attacks Based in Electromagnetic Effects
    Perotoni, M. B.
    Barreto, R. M.
    Manfrin, S. K.
    IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (06) : 2838 - 2845
  • [27] Cyber-attacks and stock market activity
    Tosun, Onur Kemal
    INTERNATIONAL REVIEW OF FINANCIAL ANALYSIS, 2021, 76
  • [28] Companies shoddy about cyber-attacks
    Sterlicchi, John
    Computer Fraud and Security, 2002, 2002 (03): : 7 - 8
  • [29] Resisting the persistent threat of cyber-attacks
    Russell G.
    Computer Fraud and Security, 2017, 2017 (12): : 7 - 11
  • [30] Mindfulness in Cyber Security - Examining Responder Behaviors in Cyber-Attacks
    Tapanainen, Tommi
    AMCIS 2017 PROCEEDINGS, 2017,