Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths

  title={Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths},
  author={Xiaokui Shu and Danfeng Yao and Naren Ramakrishnan},
  booktitle={ACM Conference on Computer and Communications Security},
Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with non-control data and waiting for the modified data to propagate and alter the control flow legally. Existing program anomaly detection systems focusing on legal control flow attestation and short call sequence verification are inadequate to detect such stealthy attacks. In this paper, we point out the need to analyze program execution paths and discover event correlations in large… CONTINUE READING
Highly Cited
This paper has 42 citations. REVIEW CITATIONS
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS
26 Citations
3 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 26 extracted citations


Publications referenced by this paper.
Showing 1-3 of 3 references

Similar Papers

Loading similar papers…