On the detection of exploitation of vulnerabilities leading to the execution of a malicious code
Modelirovanie i analiz informacionnyh sistem, Tome 27 (2020) no. 2, pp. 138-151

Voir la notice de l'article provenant de la source Math-Net.Ru

Software protection from exploitation of possible unknown vulnerabilities can be performed both by searching (for example, using symbolic execution) and subsequent elimination of the vulnerabilities and by using detection and / or intrusion prevention systems. In the latter case, this problem is usually solved by forming a profile of a normal behavior and deviation from normal behavior over a predetermined threshold is regarded as an anomaly or an attack. In this paper, the task is to protect a given software $P$ from exploiting unknown vulnerabilities. For this aim a method is proposed for constructing a profile of the normal execution of the program $P$, in which, in addition to a set of legal chains of system and library functions, it is proposed to take into account the distances between adjacent function calls. At the same time, a profile is formed for each program. It is assumed that taking into account the distances between function calls will reveal shell code execution using system and / or library function calls. An algorithm and a system for detecting abnormal code execution are proposed. The work carried out experiments in the case when $P$ is the FireFox browser. During the experiments the possibility of applying the developed algorithm to identify abnormal behavior when launching publicly available exploits was investigated.
Keywords: system calls, library calls, software vulnerability.
@article{MAIS_2020_27_2_a0,
     author = {Yu. V. Kosolapov},
     title = {On the detection of exploitation of vulnerabilities leading to the execution of a malicious code},
     journal = {Modelirovanie i analiz informacionnyh sistem},
     pages = {138--151},
     publisher = {mathdoc},
     volume = {27},
     number = {2},
     year = {2020},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/MAIS_2020_27_2_a0/}
}
TY  - JOUR
AU  - Yu. V. Kosolapov
TI  - On the detection of exploitation of vulnerabilities leading to the execution of a malicious code
JO  - Modelirovanie i analiz informacionnyh sistem
PY  - 2020
SP  - 138
EP  - 151
VL  - 27
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/MAIS_2020_27_2_a0/
LA  - ru
ID  - MAIS_2020_27_2_a0
ER  - 
%0 Journal Article
%A Yu. V. Kosolapov
%T On the detection of exploitation of vulnerabilities leading to the execution of a malicious code
%J Modelirovanie i analiz informacionnyh sistem
%D 2020
%P 138-151
%V 27
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/MAIS_2020_27_2_a0/
%G ru
%F MAIS_2020_27_2_a0
Yu. V. Kosolapov. On the detection of exploitation of vulnerabilities leading to the execution of a malicious code. Modelirovanie i analiz informacionnyh sistem, Tome 27 (2020) no. 2, pp. 138-151. http://geodesic.mathdoc.fr/item/MAIS_2020_27_2_a0/