Detecting illegal system calls using a data-oriented detection model

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The most common anomaly detection mechanisms at application level consist in detecting a deviation of the control-flow of a program. A popular method to detect such anomaly is the use of application sequences of system calls. However, such methods do not detect mimicry attacks or attacks against the integrity of the system call parameters. To enhance such detection mechanisms, we propose an approach to detect in the application the corruption of data items that have an influence on the system calls. This approach consists in building automatically a data-oriented behaviour model of an application by static analysis of its source code. The proposed approach is illustrated on various examples, and an injection method is experimented to obtain an approximation of the detection coverage of the generated mechanisms. © 2011 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Demay, J. C., Majorczyk, F., Totel, E., & Tronel, F. (2011). Detecting illegal system calls using a data-oriented detection model. In IFIP Advances in Information and Communication Technology (Vol. 354 AICT, pp. 305–316). Springer New York LLC. https://doi.org/10.1007/978-3-642-21424-0_25

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free