期刊文献+

面向数字货币特征的细粒度代码注入攻击检测 被引量:1

Digital Currency Features Oriented Fine-Grained Code Injection Attack Detection
下载PDF
导出
摘要 数字货币的迅速发展使其被越来越多的恶意软件利用.现有勒索软件通常使用数字货币作为支付手段,而现有代码注入攻击检测手段缺乏对相关恶意特征的考虑,使得其难以有效检测勒索软件的恶意行为.针对此问题,提出了一种细粒度的代码注入攻击检测内存特征方案,利用勒索软件在引导被攻击者支付过程中表现的数字货币内存特征,结合多种通用的细粒度内存特征,实现了一种细粒度的代码注入攻击检测系统.实验结果表明:新的内存特征方案能够在多个指标上有效提升现有检测系统内存特征方案的检测性能,同时使得基于主机的代码注入攻击检测系统能够准确检测勒索软件行为,系统还具有较好的内存特征提取性能及对未知恶意软件家族的检测能力. Digital currencies have developed rapidly and emerged as a critical form of our payment system.Consequently,the applications and platforms of digital currencies and their payment services are extensively exposed to various exploits by malware.In a typical scenario,modern ransomware usually leverages digital currencies as the medium of payment.The state-of-the-art code injection attack detections have rarely considered such digital currency-related memory features,thus can hardly identify the malicious behaviors of ransomware.To mitigate this issue,we propose a fine-grained scheme of memory forensics to facilitate the detection of host-based code injection attacks with the ability to identify ransomware.We capture the digital currency-related memory features exhibited in the procedure of inducing the victims payment.We incorporate such memory features into a set of general memory features and implement a fine-grained detection system on code injection attacks.According to the experimental results,the new scheme of memory forensics effectively improves the performance of the state-of-the-art detection system on different metrics.Meanwhile,our approach enables the detection systems of host-based code injection attacks to capture the behaviors of ransomware precisely.Moreover,the extraction of the newly proposed memory features is efficient,and our detection system is capable of detecting unknown malware families.
作者 孙聪 李占魁 陈亮 马建峰 乔新博 Sun Cong;Li Zhankui;Chen Liang;Ma Jianfeng;Qiao Xinbo(School of Cyber Engineering,Xidian University,Xi' an 710071;HUAWEI Technologies Co.,Ltd,Xi' an 710075)
出处 《计算机研究与发展》 EI CSCD 北大核心 2021年第5期1035-1044,共10页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61872279) 陕西省重点研发计划项目(2020GY-004,2019ZDLGY12-06)。
关键词 代码注入攻击 机器学习 内存取证 勒索软件 数字货币 code injection attack machine learning memory forensics ransomware digital currency
  • 相关文献

参考文献2

二级参考文献20

  • 1Su Zhendong, Wassermann G. The essence of command injection attacks in Web applications [C] //Proc of the ACM Symp on PrincipLes of Programming Languages (POPL). New York: ACM, 2006.
  • 2Kneuss E, Suter P, Kuncak V. Phantm: Php analyzer for type mismatch [C] //Proc of ACM SIGSOFT 18th Int Symp on the Foundations of Software Engineering. New York: ACM, 2010.
  • 3Jovanovic N, Kruegel C, Kirda E. Precise alias analysis for static detection of Web application vulnerabilities [C] //Proc of ACM SIGPLAN Workshop on Programming Languages and Analysis for Security. New York: ACM, 2006.
  • 4Minamide Y. Static approximation of dynamically generated Web pages [C] //Proc of the 14th Int Conf on World Wide Web. NewYork: ACM, 2005.
  • 5Wassermann G, Su Zhendong. Sound and precise analysis of Web applications for injection vulnerabilities [C]//Proc of ACM Conf on Programming Language Design and Implementation (PLDI). New York: ACM, 2007.
  • 6Wassermann G, Su Zhendong. Static detection of cross-site scripting vulnerabilities [C] //Proc of the 29th Int Conf on Software Engineering(ICSE). New York: ACM, 2008.
  • 7Allen J. Perl version 5.12.2 documentation-perlsec [EB/OL]. [2011-09-22]. http://perldoc, peri. org/perlsec. pdf.
  • 8Nguyen-Tuong A, Guarnieri S, Greene D, et al. Automatically hardening Web applications using precise tainting [C] //Proc of the 20th IFIP Int Information Security Conf. Berlin: Springer, 2005.
  • 9Martin M, Lam M S. Automatic generation of XSS and SQL injection attacks with goal-directed model checking [C]//Proc of the 17th USENIX Security Symp. New York: ACM, 2008.
  • 10Kieyzun A, Guo P J, Jayaraman K, et al. Automatic creation of SQL injection and cross-site scripting attacks [C] //Proc of the 30th Int Conf on Software Engineering (ICSE). New York: ACM, 2009.

共引文献21

同被引文献16

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部