2016
DOI: 10.1007/978-3-319-41483-6_24
|View full text |Cite
|
Sign up to set email alerts
|

Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems

Abstract: It is argued that runtime verification techniques can be used to identify unknown application security vulnerabilities that are a consequence of unexpected execution paths in software. A methodology is proposed that can be used to build a model of expected application execution paths during the software development cycle. This model is used at runtime to detect exploitation of unknown security vulnerabilities using anomaly detection style techniques. The approach is evaluated by considering its effectiveness i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…This compromise allows the attacker to inject malicious code into the software or hardware [16], leading to the infection of downstream components in the supply chain. Another common threat is the exploitation of zero-day vulnerabilities in software (ZDS) [47], [48]. Zero-day vulnerabilities refer to unknown vulnerabilities in software that are not yet patched or mitigated by the software vendor.…”
Section: A Supply Chainsmentioning
confidence: 99%
“…This compromise allows the attacker to inject malicious code into the software or hardware [16], leading to the infection of downstream components in the supply chain. Another common threat is the exploitation of zero-day vulnerabilities in software (ZDS) [47], [48]. Zero-day vulnerabilities refer to unknown vulnerabilities in software that are not yet patched or mitigated by the software vendor.…”
Section: A Supply Chainsmentioning
confidence: 99%
“…However, discovering the other types of vulnerabilities in an automated way is a field that has not been explored yet in depth [4]. As we can observe in the cases of Apache Struts [5], Shellshock [6], and Heartbleed [2], security design flaws do not affect the functionality of software systems, but they can cause serious security accidents such as remote code executions [7][8][9]. However, these vulnerabilities are difficult to detect and there have not been many research efforts conducted to develop effective, automated approaches that can find such security vulnerabilities [10].…”
Section: Introductionmentioning
confidence: 99%
“…System calls are a widely used feature for this [12,13]. Anomaly detection systems are highly interesting in this context, specially to fight against zero-day attacks and vulnerability exploitation [14].…”
Section: Introductionmentioning
confidence: 99%