期刊文献+

Program Monitoring Based on Automaton Simulation

Program Monitoring Based on Automaton Simulation
原文传递
导出
摘要 To check whether a program behaves in expectation, program monitoring systems are used for intrusion detection. This article presents a program monitoring system using automaton simulation based on the state graphs extracted from C programs through static analysis. For complete state graph construction, a pointer alias analysis method is proposed to solve the function pointers for obtaining actual control flows. After compiling, pro- grams are instrumented with probes to report the internal states when they are running. A program monitor is built in the kernel of Linux system, which monitors the states of programs from probes and checks the paths of execution. This monitoring system could respond to the abnormal behaviors immediately to protect the sys- tems and programs from further damages. To check whether a program behaves in expectation, program monitoring systems are used for intrusion detection. This article presents a program monitoring system using automaton simulation based on the state graphs extracted from C programs through static analysis. For complete state graph construction, a pointer alias analysis method is proposed to solve the function pointers for obtaining actual control flows. After compiling, pro- grams are instrumented with probes to report the internal states when they are running. A program monitor is built in the kernel of Linux system, which monitors the states of programs from probes and checks the paths of execution. This monitoring system could respond to the abnormal behaviors immediately to protect the sys- tems and programs from further damages.
机构地区 School of Computer
出处 《Wuhan University Journal of Natural Sciences》 CAS 2013年第2期102-108,共7页 武汉大学学报(自然科学英文版)
基金 Supported by National Natural Science Foundation of China(91118003,61003071) Special Funds for Shenzhen Strategic New Industry Development(JCYJ20120616135936123) the Fundamental Research Funds for the Central Universities(3101046,201121102020006)
关键词 program monitonng intrusion detection h.mCtlOncall state graph program monitonng intrusion detection h.mCtlOncall state graph
  • 相关文献

参考文献16

  • 1Spivey J M. Fast, accurate call graph profiling [J]. Software-Practice & Experience, 2004, 34(3): 249-264.
  • 2Milanova A, Rountev A, Ryder B G, et al. Precise call graphs for C programs with function pointers [J]. Automated Software Engineering, 2004, 11(1): 7-26.
  • 3Bruening D, Qin Zhao, Amarasinghe S. Transparent dynamic instrumentation [C]//Proceedings of the 8th ACM SIGPLAN /SIGOPS Conference on ~rtual Execution Environments. New York: ACM Press, 2012: 133-144.
  • 4Xu X F, Chen Y, Wong W E, et al. VNM: A novel method to reduce the overhead of program instrumentation [C]# WR/ Worm Congress on Software Engineering. New Jersey: IEEE Computer Society, 2009, (4): 256-260.
  • 5Chittimalli P K, Shah V. GEMS: A generic model based source code instrumentation framework [C] // 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation. Montreal: IEEE Computer Society, 2012: 909-914.
  • 6Hofmeyr S A, Forrest S, Somayaji A. Intrusion detection using sequences of system calls [J]. Journal of computer security, 1998, 6(3): 151-180.
  • 7Garfinkel T, Rosenblum M. A virtual machine introspection based architecture for intrusion detection [C] // Proccedings of Network and Distributed Systems Security Symposium. San Diego: The Internet Society, 2003: 191-206.
  • 8Kosoresow A P, Hofmeyer S A. Intrusion detection via system call traces[J]. Software IEEE, 1997, 14(5):35-42.
  • 9Sekar R, Bendre M, Dhurjati D, et al. A fast automaton- based method for detecting anomalous program behaviors [C] //Proceedings of lEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society, 2001: 144-155.
  • 10Wagner D, Dean R. Intrusion detection via static analysis [C] //Proceedings of lEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society, 2001: 156-168.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部