Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths

@inproceedings{Shu2015UnearthingSP,
  title={Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths},
  author={Xiaokui Shu and Danfeng Yao and Naren Ramakrishnan},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2015}
}
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with non-control data and waiting for the modified data to propagate and alter the control flow legally. Existing program anomaly detection systems focusing on legal control flow attestation and short call sequence verification are inadequate to detect such stealthy attacks. In this paper, we point out the need to analyze program execution paths and discover event correlations in large… CONTINUE READING
Highly Cited
This paper has 42 citations. REVIEW CITATIONS
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS
26 Citations
3 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 26 extracted citations

References

Publications referenced by this paper.
Showing 1-3 of 3 references

Similar Papers

Loading similar papers…