SecondDEP: Resilient Computing that Prevents Shellcode Execution in Cyber-Attacks

被引:9
|
作者
Okamoto, Takeshi [1 ]
机构
[1] Kanagawa Inst Technol, Atsugi, Kanagawa 2430292, Japan
关键词
DEP; API hooking; shellcode; cyber-attack; vulnerability; Metasploit Framework; ROP;
D O I
10.1016/j.procs.2015.08.211
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a novel method of preventing shellcode execution even if DEP is bypassed. The method prevents Windows APIs from calling on a data area by API hooking, based on evidence that shellcode is executed in a data area and that the shellcode calls Windows APIs. Performance tests indicated that all samples of shellcode provided by Metasploit Framework, as well as the 18 most recent attacks using Metasploit Framework, can be detected. Comparison of this method with anti-virus products showed that this method prevented shellcode execution, whereas anti-virus products failed. Another test showed that the overhead of the method has little effect on the performance of computer operations. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:691 / 699
页数:9
相关论文
共 50 条
  • [31] TAXONOMY OF SEVERITY OF CYBER-ATTACKS IN CYBER-MANUFACTURING SYSTEMS
    Espinoza-Zelaya, Carlos
    Moon, Young
    PROCEEDINGS OF ASME 2022 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, IMECE2022, VOL 2B, 2022,
  • [32] Analysis of jamming and spoofing cyber-attacks on drones
    Pey, Jeferson Nascimento Aquilar
    Nze, Georges Daniel Amvame
    Albuquerque, Robson de Oliveira
    Iberian Conference on Information Systems and Technologies, CISTI, 2022, 2022-June
  • [33] The potential for massive cyber-attacks is no longer futuristic
    不详
    NEW SCIENTIST, 2008, 198 (2661) : 29 - 29
  • [34] Resilient Leader-Following Formation Control For a Fleet of Unmanned Aerial Vehicles Under Cyber-Attacks
    Trejo, Juan Antonio Vazquez
    Guenard, Adrien
    Adam-Medina, Manuel
    Ciarletta, Laurent
    Ponsart, Jean-Christophe
    Theilliol, Didier
    2023 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS, ICUAS, 2023, : 731 - 737
  • [35] A Neural-Lyapunov-Based Adaptive Resilient Cruise Control of Platoons Subject to Cyber-Attacks on Leaders
    Khoshnevisan, Ladan
    Liu, Xinzhi
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 7 - 12
  • [36] Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks
    Liu, Yonggui
    Li, Ziyuan
    Shen, Zhiping
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (05): : 2780 - 2800
  • [37] Cyber-Attacks on Smart Grid System: A Review
    Gajanan, Linge Sagar
    Kirar, Mukesh
    Raju, More
    2022 IEEE 10TH POWER INDIA INTERNATIONAL CONFERENCE, PIICON, 2022,
  • [38] Protecting nuclear plants from cyber-attacks
    Armstrong, Peter
    NUCLEAR ENGINEERING INTERNATIONAL, 2014, 59 (723): : 22 - 23
  • [39] Identification and Localization of Cyber-Attacks in Industrial Facilities
    Reibelt, Kathrin
    Matthes, Joerg
    Keller, Hubert B.
    Hagenmeyer, Veit
    30TH EUROPEAN SYMPOSIUM ON COMPUTER AIDED PROCESS ENGINEERING, PTS A-C, 2020, 48 : 1741 - 1746
  • [40] Probabilistic modeling and analysis of sequential cyber-attacks
    Liu, Qisi
    Xing, Liudong
    Zhou, Chencheng
    ENGINEERING REPORTS, 2019, 1 (04)