exploit code is widely used for detecting vulnerabilities and implementing defensive measures. However, automatic generation of exploit code for security assessment is a challenging task. In this paper, we propose a n...
详细信息
exploit code is widely used for detecting vulnerabilities and implementing defensive measures. However, automatic generation of exploit code for security assessment is a challenging task. In this paper, we propose a novel template-augmented exploit code generation approach exploitGen based on codeBERT. Specifically, we first propose a rule-based Template Parser to generate template-augmented natural language descriptions (NL). Both the raw and template-augmented NL sequences are encoded to context vectors by the respective encoders. For better learning semantic information, exploitGen incorporates a semantic attention layer, which uses the attention mechanism to extract and calculate each layer's representational information. In addition, exploitGen computes the interaction information between the template information and the semantics of the raw NL and designs a residual connection to append the template information into the semantics of the raw NL. Comprehensive experiments on two datasets show the effectiveness of exploitGen after comparison with six state-of-the-art baselines. Apart from the automatic evaluation, we conduct a human study to evaluate the quality of generated code in terms of syntactic and semantic correctness. The results also confirm the effectiveness of exploitGen.(c) 2022 Elsevier Inc. All rights reserved.
Recently, a malicious user attacks a web browser through a malicious page that exploits the vulnerability of the browser and that executes malicious code. To prevent this attack, some methods have been devised such as...
详细信息
Recently, a malicious user attacks a web browser through a malicious page that exploits the vulnerability of the browser and that executes malicious code. To prevent this attack, some methods have been devised such as DEP (Data Execution Prevention) that prevents data in stack frame or heap region from being executed. However, to evade these defense techniques, return-oriented programming (ROP) is introduced. ROP executes arbitrary code indirectly using gadget, which is group of instructions including ret instruction in a module that doesn't apply ASLR (Address Space Layout Randomization). In this paper, we propose a static approach to detect ROP payload in a network irrespective of the environment of the system under attack. Most studies have tried to detect ROP attacks using dynamic analysis, because ROP has various addresses of gadgets according to loaded modules. These methods have a limitation that must consider the environment of system to operate ROP, such as the version of OS and modules including gadgets. To overcome this limitation, our method detects ROP payload using static analysis without preliminary knowledge about the environment. We extract five characteristics of ROP and then propose a novel algorithm, STROP, to detect ROP in payload without execution. Our idea is as follows: STROP makes stack frame using input payload statically. It extracts addresses suspected as indicating gadgets and makes groups using the addresses. And then, STROP determine whether the payload includes ROP based on static characteristics. We implement a prototype using snort (network-based intrusion system) and evaluate it. Experiments show that our technique can detect ROP payload with a low number of false alarms. False positive (FP) is 1.3% for 2,239 benign files and 0.05-0.51% for 1GB packet dump file. Among 68 ROP payloads, STROP detects 51 payloads. This research can be applied to existing systems that collect malicious codes, such as Honeypot.
exploit code based on system vulnerability is often used by attacker. Such exploit program often sends attack packets in the first few packets. A Lightweight Network intrusion Detection system (LNID) is proposed for d...
详细信息
exploit code based on system vulnerability is often used by attacker. Such exploit program often sends attack packets in the first few packets. A Lightweight Network intrusion Detection system (LNID) is proposed for detecting such attacks on Telnet traffic. It characterizes normal traffic behavior and computes the anomaly score of a packet based on the deviation from the normal behavior. Instead of processing all traffic packets, an efficient filtering scheme proposed in the study can reduce system workload and only 0.3% of the original traffic volume is examined for anomaly. According to the performance comparisons with other network-based IDS, LNID is the most efficient on detection rate and workload reduction, (C) 2009 Elsevier B.V. All rights reserved.
Computing devices are routinely targeted by a wide variety of mal-ware, suchas spyware, trojans, rootkits, and viruses. The presence of exploitable vulnerabilities in systemsoftware, and the widespread availability of...
详细信息
Computing devices are routinely targeted by a wide variety of mal-ware, suchas spyware, trojans, rootkits, and viruses. The presence of exploitable vulnerabilities in systemsoftware, and the widespread availability of tools for constructing exploit code, has reduced theamount of effort required for attackers to introduce malware into computing devices. Increasinglevels of network connectivity further exacerbates the problem of malware propagation by enablingattacks to be launched remotely. Current computing devices are routinely used for security-sensitiveapplications; thus malware present on these devices can potentially compromise the privacy andsafety of users. Furthermore, most computing devices today are part of a large networkedinfrastructure. Hence, the compromise of any one computing device can lead to the compromise of thenetworked applications. For example, a rogue wireless LAN access point can modify network traffic,thereby potentially affecting all computing devices that use this access point. Therefore, to usecomputing devices with confidence, users need assurance the software on their own computing devicesand other computing devices in their network executes untampered by malware.
We solve a multiple moving-target estimation problem using a colocated multiple-input multiple-output (MIMO) radar system. Each antenna of the radar array transmits noise waveforms to achieve high resolution. These wa...
详细信息
ISBN:
(纸本)9781467310710
We solve a multiple moving-target estimation problem using a colocated multiple-input multiple-output (MIMO) radar system. Each antenna of the radar array transmits noise waveforms to achieve high resolution. These waveforms are further covered by codes that are inspired from code division multiple access (CDMA) to exploit code diversity. We formulate the measurement model using a sparse representation in an appropriate basis to estimate the unknown target parameters (delays, Dopplers) using support recovery algorithms. We demonstrate the performance of the proposed system using numerical simulations.
Malicious cyber activities impose substantial costs on the U.S. economy and global markets. Cyber-criminals often use information-sharing social media platforms such as paste sites (e.g., Pastebin) to share vast amoun...
详细信息
ISBN:
(纸本)9781665438384
Malicious cyber activities impose substantial costs on the U.S. economy and global markets. Cyber-criminals often use information-sharing social media platforms such as paste sites (e.g., Pastebin) to share vast amounts of plain text content related to Personally Identifiable Information (PII), credit card numbers, exploit code, malware, and other sensitive content. Paste sites can provide targeted Cyber Threat Intelligence (CTI) about potential threats and prior breaches. In this research, we propose a novel Bidirectional Encoder Representation from Transformers (BERT) with Latent Dirichlet Allocation (LDA) model to categorize pastes automatically. Our proposed BERT-LDA model leverages a neural network transformer architecture to capture sequential dependencies when representing each sentence in a paste. BERT-LDA replaces the Bag-of-Words (BoW) approach in the conventional LDA with a Bag-of-Labels (BoL) that encompasses class labels at the sequence level. We compared the performance of the proposed BERT-LDA against the conventional LDA and BERT-LDA variants (e.g., GPT2-LDA) on 4,254,453 pastes from three paste sites. Experiment results indicate that the proposed BERT-LDA outperformed the standard LDA and each BERT-LDA variant in terms of perplexity on each paste site. Results of our BERT-LDA case study suggest that significant content relating to hacker community activities, malicious code, network and website vulnerabilities, and PII are shared on paste sites. The insights provided by this study could be used by organizations to proactively mitigate potential damage on their infrastructure.
Polymorphic worms evade network security systems by varying their payload every time an infection is attempted. The payload's variation operation is performed by using built-in self content encryptor. However, all...
详细信息
ISBN:
(纸本)9781612841564
Polymorphic worms evade network security systems by varying their payload every time an infection is attempted. The payload's variation operation is performed by using built-in self content encryptor. However, all encrypted payloads share the same invariant exploit code to ensure exploiting same vulnerability in same manner on all victims. This research paper is an endeavor to interpret the invariant part into signature. The basic idea of the proposed method is to assemble attacking payloads on a honeypot, and then extracting the worm's signature by using a matching technique. The experiments were conducted on two datasets, Witty worm's payloads and. synthetic payloads, and have demonstrated promising results.
Polymorphic worms evade network security systems by varying their payload every time an infection is *** payload's variation operation is performed by using built-in self content ***,all encrypted payloads share t...
详细信息
Polymorphic worms evade network security systems by varying their payload every time an infection is *** payload's variation operation is performed by using built-in self content ***,all encrypted payloads share the same invariant exploit code to ensure exploiting same vulnerability in same manner on all *** research paper is an endeavor to interpret the invariant part into *** basic idea of the proposed method is to assemble attacking payloads on a honeypot,and then extracting the worm's signature by using a matching *** experiments were conducted on two datasets,Witty worm's payloads and synthetic payloads,and have demonstrated promising results.
暂无评论