2012
DOI: 10.1007/978-3-642-31909-9_11
|View full text |Cite
|
Sign up to set email alerts
|

SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits

Abstract: Abstract. Web services have been greatly threatened by remote exploit code attacks, where maliciously crafted HTTP requests are used to inject binary code to compromise web servers and web applications. In practice, besides detection of such attacks, attack attribution analysis, i.e., to automatically categorize exploits or to determine whether an exploit is a variant of an attack from the past, is also very important. In this paper, we present SA 3 , an exploit code attribution analysis which combines semanti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
3
1
1

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…We performed the same testing procedure mentioned in the previous section to test the accuracy of our model for 2, ..., 13 shellcode classes. Our model can achieve 100% classification accuracy for up to 6 shellcode engines and 95.0% classification accuracy for 11 classes, which is higher than previous efforts [16]. Note that, compared with [16] in which a specific model is built for each shellcode class, our approach only use one model to classify instances from all kinds of classes, hence does not need different parameter settings for each model.…”
Section: ) the Hardness Of Multi-class Attributingmentioning
confidence: 90%
See 3 more Smart Citations
“…We performed the same testing procedure mentioned in the previous section to test the accuracy of our model for 2, ..., 13 shellcode classes. Our model can achieve 100% classification accuracy for up to 6 shellcode engines and 95.0% classification accuracy for 11 classes, which is higher than previous efforts [16]. Note that, compared with [16] in which a specific model is built for each shellcode class, our approach only use one model to classify instances from all kinds of classes, hence does not need different parameter settings for each model.…”
Section: ) the Hardness Of Multi-class Attributingmentioning
confidence: 90%
“…Even though some payloads are not compatible with specific encoders, we successfully collected 13,176 encoded shellcode samples for attribution analysis. Compared with existing research bodies in both shellcode detection and attribution [7], [30], [26], [29], [16], our shellcode dataset covers a more comprehensive set of samples in term of underlying platform, payload functionality, and encoder class.…”
Section: A Data Collection and Implementationmentioning
confidence: 99%
See 2 more Smart Citations
“…A few other efforts (e.g., [7,14,10,1,12,13]) also considered using the structure information in malware programs. For instance, Hu et al used FCGs extracted from malware programs for fast indexing, which aims to find the nearest neighbors of a new malware sample [7], and Kruegel et al formulated the problem of polymorphic worm detection as coloring of control flow graphs [14].…”
Section: Related Workmentioning
confidence: 99%