An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

@article{Bruschi2007AnET,
  title={An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks},
  author={Danilo Bruschi and Lorenzo Cavallaro and Andrea Lanzi},
  journal={2007 IEEE International Performance, Computing, and Communications Conference},
  year={2007},
  pages={418-425}
}
In this paper we propose a new strategy for dealing with the impossible path execution (IPE) and the mimicry attack in the N-gram based HIDS model. Our strategy is based on a kernel-level module which interacts with an underlying HIDS and whose main scope is to "randomize" sequences of system calls produced by an application to make them unpredictable by any attacker. We implemented a prototype of such a module on a Linux system in order to experimentally verify the feasibility and efficacy of… CONTINUE READING
Highly Cited
This paper has 20 citations. REVIEW CITATIONS