Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique

被引:0
|
作者
Kim, Daewon [1 ]
Kim, Ikkyun [1 ]
Oh, Jintae [1 ]
Cho, Hyunsook [1 ]
机构
[1] Elect & Telecommun Res Inst Korea, Informat Secur Res Div, Seoul, South Korea
关键词
Exploit; shellcode; polymorphism; malware;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The general method in which attackers obtain the control authority of the remote host is through the exploit code. As network security systems have mounted the desired signatures about exploits, they have reduced damage due to the spreading and reoccurrence of the exploits. However, to avoid signature-based detection techniques, exploits employing techniques such as polymorphism and metamorphism have become more prevalent. Especially in the case of polymorphism, because there are many automation engines even if there is no special knowledge in order to make various exploits easily, the polymorphism researches need to be more actively studied. We present a new static analysis method for detecting the decryption routine of polymorphic exploit code. Most of decryption routines store the program counter value of remote host on a stack and use the value as the address for accessing the memory that the encrypted original code is positioned. The proposed method traces the processing steps of decryption routine as using the static analysis method. In the results of experiment, the proposed method can detect polymorphic exploit codes that the static analysis resistant techniques are used, and shows more efficient than the emulation-based method in the processing performance.
引用
收藏
页码:904 / 909
页数:6
相关论文
共 50 条
  • [1] A fast static analysis approach to detect exploit code inside network flows
    Chinchani, R
    van den Berg, E
    RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 284 - 308
  • [2] On the capability of static code analysis to detect security vulnerabilities
    Goseva-Popstojanova, Katerina
    Perhinschi, Andrei
    INFORMATION AND SOFTWARE TECHNOLOGY, 2015, 68 : 18 - 33
  • [3] Static code analysis
    Louridas, P
    IEEE SOFTWARE, 2006, 23 (04) : 58 - 61
  • [4] Analysis of the Tools for Static Code Analysis
    Nikolic, Danilo
    Stefanovic, Darko
    Dakic, Dusanka
    Sladojevic, Srdan
    Ristic, Sonja
    2021 20TH INTERNATIONAL SYMPOSIUM INFOTEH-JAHORINA (INFOTEH), 2020,
  • [5] The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities
    Mokhov, Serguei A.
    Paquet, Joey
    Debbabi, Mourad
    ADVANCES IN ARTIFICIAL INTELLIGENCE, CANADIAN AI 2014, 2014, 8436 : 326 - 332
  • [6] Static Analysis of ROP Code
    D'Elia, Daniele Cono
    Coppa, Emilio
    Salvati, Andrea
    Demetrescu, Camil
    PROCEEDINGS OF THE 12TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2019), 2019,
  • [7] STATIC ANALYSIS OF POSTSCRIPT CODE
    HORSPOOL, RN
    VITEK, J
    COMPUTER LANGUAGES, 1993, 19 (02): : 65 - 78
  • [8] Static analysis for Guarded code
    Hu, P
    LANGUAGES, COMPILERS, AND RUN-TIME SYSTEMS FOR SCALABLE COMPUTERS, 2000, 1915 : 44 - 56
  • [9] Static disassembly and code analysis
    Vigna, Giovanni
    MALWARE DETECTION, 2007, : 19 - 41
  • [10] Diktat: Lightweight Static Analysis for Kotlin
    Kuleshov, Andrey
    Trifanov, Petr
    Frolov, Vladislav
    Liang, Guangtai
    2021 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2021), 2021, : 365 - 370