2017
DOI: 10.1145/3105761
|View full text |Cite
|
Sign up to set email alerts
|

Long-Span Program Behavior Modeling and Attack Detection

Abstract: Intertwined developments between program attacks and defenses witness the evolution of program anomaly detection methods. Emerging categories of program attacks, e.g., non-control data attacks and data-oriented programming, are able to comply with normal trace patterns at local views. This article points out the deficiency of existing program anomaly detection models against new attacks and presents long-span behavior anomaly detection (LAD), a model based on mildly context-sensitive grammar verification. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 54 publications
0
7
0
Order By: Relevance
“…As a result, they have exhibited little success in detecting APTs. Systems that attempt to capture long-term program behavior [112] limit their analysis to event co-occurrence to avoid high computational and memory overheads.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, they have exhibited little success in detecting APTs. Systems that attempt to capture long-term program behavior [112] limit their analysis to event co-occurrence to avoid high computational and memory overheads.…”
Section: Introductionmentioning
confidence: 99%
“…There is an increasing interest in applying machine learning techniques to software development [73]. Existing approaches address a variety of development tasks, including fuzz testing [74,75], detecting code clone [76,4,19,77], improving static analysis for bug funding [78,79], repairing programs [80], defect prediction [81,82], attack detection [83] and processing bug reports [18,23,24]. FUNDED builds on those past foundations but is quality different from these studies.…”
Section: Related Workmentioning
confidence: 99%
“…Program behavior modeling has been an active research topic over the past decade and various models have been proposed for legacy applications [16]. Existing models can be classified into two categories: i) local model (e.g., n-gram model [32], hidden markov model (HMM) based approach [33], finite-state automaton (FSA) model [44]); and ii) long-range model (e.g., frequency distribution based models [31], [39], [45]). Local anomaly detection inspects short-range segments of program execution traces to detect anomalies such as control-flow violations.…”
Section: Program Behavior Model Choicesmentioning
confidence: 99%