Dynamic taint analysis methods, due to their language independence, reliance on binary code, and high accuracy, have been widely applied in the field of binary program vulnerability detection and security. However, th...
详细信息
ISBN:
(纸本)9798400716638
Dynamic taint analysis methods, due to their language independence, reliance on binary code, and high accuracy, have been widely applied in the field of binary program vulnerability detection and security. However, these methods often incur significant performance overhead due to binary instrumentation. To address these issues, this study first categorizes x86 instructions and designs corresponding taint propagation strategies for each instruction category. It introduces the concept of taint analysis-agnostic classes to reduce redundant analysis and minimize performance overhead. Furthermore, a taint flow filtering mechanism is proposed during the taint propagation process to reduce inefficient analysis and improve analysis efficiency. Experimental results demonstrate that the improved dynamic taint analysis method can accurately detect vulnerabilities with CVE identifiers and outperforms traditional dynamic taint analysis methods in terms of performance. Therefore, the proposed improved dynamic taint analysis method effectively enhances both detection effectiveness and performance.
We present a machine learning approach to improve the accuracy of summarized incident report visualizations for cyber security. We extend a recent incident report summarization method by training a Bayesian hierarchic...
详细信息
ISBN:
(纸本)9781665423359
We present a machine learning approach to improve the accuracy of summarized incident report visualizations for cyber security. We extend a recent incident report summarization method by training a Bayesian hierarchical model to optimize the summarization algorithm's weights. We also train a flat model and a neural network as alternative models to compare against our hierarchical model. Summaries generated by our hierarchical model achieve higher accuracy than the other methods, with an AUC 0.2 higher than the unweighted method while achieving comparable summarization size. We further demonstrate that visualizations of the hierarchical model's summaries are at least as useful the unweighted method's summaries, and possibly more useful.
HPC and distributed systems are the driving force for the advancement of many emerging technologies, such as exascale systems, quantum machines, terabit networking, 5G/6G wireless, and cloud/edge computing. The tasks ...
详细信息
ISBN:
(纸本)9781450391993
HPC and distributed systems are the driving force for the advancement of many emerging technologies, such as exascale systems, quantum machines, terabit networking, 5G/6G wireless, and cloud/edge computing. The tasks of systems and network telemetry are a key element for effective operations and management of the advancement of many emerging systems and technologies, and require more scalable telemetry and analysis techniques for comprehensive monitoring and analysis. Various input sources such as end systems, switches, firewalls, intrusion sensors and the emerging network elements speaking with different syntax and semantics make organizing and incorporating the generated data challenging for the quantitative and qualitative analysis. This workshop looks for new approaches and methods at the intersection of HPC systems and data sciences to address these difficult challenges of emerging technologies from the diverse angles of systems/network performance, availability, reliability, and security.
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a network. State-of-the-art approaches for AG generation focus mostly on deriving dependencies between system vulnerabilities ba...
详细信息
ISBN:
(纸本)9781665420853
Attack graphs (AG) are used to assess pathways availed by cyber adversaries to penetrate a network. State-of-the-art approaches for AG generation focus mostly on deriving dependencies between system vulnerabilities based on network scans and expert knowledge. In real-world operations however, it is costly and ineffective to rely on constant vulnerability scanning and expert-crafted AGs. We propose to automatically learn AGs based on actions observed through intrusion alerts, without prior expert knowledge. Specifically, we develop an unsupervised sequence learning system, SAGE, that leverages the temporal and probabilistic dependence between alerts in a suffix-based probabilistic deterministic finite automaton (S-PDFA) - a model that accentuates infrequent severe alerts and summarizes paths leading to them. AGs are then derived from the S-PDFA on a per-objective, per-victim basis. Tested with intrusion alerts collected through Collegiate Penetration Testing Competition, SAGE compresses over 330k alerts into 93 AGs. These AGs reflect the strategies used by the participating teams. The AGs are succinct, interpretable, and capture behavioral dynamics, e.g., that attackers will often follow shorter paths to re-exploit objectives.
The Cyber Kill Chain (CKC) defense model aims to assist subject matter experts in planning, identifying, and executing against cyber intrusion activity, by outlining seven stages required for adversaries to execute an...
详细信息
malware frequently leaves periodic signals in network logs, but these signals are easily drowned out by non-malicious periodic network activity, such as software updates and other polling activity. This paper describe...
详细信息
ISBN:
(纸本)9781538681947
malware frequently leaves periodic signals in network logs, but these signals are easily drowned out by non-malicious periodic network activity, such as software updates and other polling activity. This paper describes a novel algorithm based on Discrete Fourier Transforms capable of detecting multiple distinct period lengths in a given time series. We pair the output of this algorithm with aggregation summary tables that give users information scent about which detections are worth investigating based on the metadata of the log events rather than the periodic signal. A visualization of selected detections enables users to see all detected period lengths per entity, and compare detections between entities to check for coordinated activity. We evaluate our approach on real-world netflow and DNS data from a large organization, demonstrating how to successfully find malicious periodic activity in a large pool of noise and non-malicious periodic activity.
Despite many years of research and significant commercial investment, the malware problem is far from being solved (or even reasonably well contained). Every week, the mainstream press publishes articles that describe...
详细信息
ISBN:
(纸本)9781450328005
Despite many years of research and significant commercial investment, the malware problem is far from being solved (or even reasonably well contained). Every week, the mainstream press publishes articles that describe yet another incident where millions of credit cards were leaked, a large company discloses that adversaries had remote access to its corporate secrets for years, and we discover a new botnet with tens of thousands of compromised machines. Clearly, this situation is not acceptable, but why isn't it getting any better?In this talk, I will discuss some of the reasons why the malware problem is fundamentally hard, and why existing defenses in industry are no longer working. I will then outline progress that researchers and industry have made over the last years, and highlight a few milestones in our struggle to keep malicious code off our computer systems. This part will not focus on advances related to the analysis of malicious code alone, but take a broader perspective. How can we prevent malicious code from getting onto our machines in the first place? How can we detect network communication between malware programs and remote control nodes? And how can we lower the benefits that attackers obtain from their compromised machines? Finally, I will point out a few areas in which I believe that we should make progress to have the most impact in our fight against malicious code.
暂无评论