CN107967426A - A kind of detection method, defence method and the system of linux kernel Data attack - Google Patents

A kind of detection method, defence method and the system of linux kernel Data attack Download PDF

Info

Publication number
CN107967426A
CN107967426A CN201711205897.1A CN201711205897A CN107967426A CN 107967426 A CN107967426 A CN 107967426A CN 201711205897 A CN201711205897 A CN 201711205897A CN 107967426 A CN107967426 A CN 107967426A
Authority
CN
China
Prior art keywords
data
linux kernel
security
critical
attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711205897.1A
Other languages
Chinese (zh)
Other versions
CN107967426B (en
Inventor
金海�
羌卫中
杨嘉玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201711205897.1A priority Critical patent/CN107967426B/en
Publication of CN107967426A publication Critical patent/CN107967426A/en
Application granted granted Critical
Publication of CN107967426B publication Critical patent/CN107967426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a kind of detection method, defence method and the system of linux kernel Data attack, which includes the following steps:Spent according to linux kernel data are security-related from linux kernel extracting data security-critical data;Linux kernel data are carried out with the data flow that static analysis obtains linux kernel data;Relation obtains the data flow of security-critical data between extraction security-critical data from the data flow of linux kernel data;Critical data in linux kernel operational process is monitored, and compared with the data flow of security-critical data, if critical data deviates the data flow of security-critical data in linux kernel operational process, it is under attack then to export linux kernel data, otherwise, output linux kernel data are not affected by attack.Compared to existing kernel data attack detecting scheme, the present invention has taken into full account that the indirect branch of program data stream is intrinsic, has effectively reduced the rate of false alarm of testing result.

Description

A kind of detection method, defence method and the system of linux kernel Data attack
Technical field
The invention belongs to kernel attack detecting to defend field, more particularly, to a kind of inspection of linux kernel Data attack Survey defence method and system.
Background technology
Kernel is operating system meat and potatoes, for a safety and stablize system for, protect kernel from The interference of other operation programs is primary.Nowadays kernel is just becoming the target of attackers, this mainly has some following reason:
First, due to the implementation of the various User space preventing mechanisms of such as ASLR, Sandbox, CFI, CPI, DEP etc., for The attack of User space program is increasingly difficult to;
Second, the attack face of kernel is big.This is because kernel code line number is big (16.9MLOC, Linuxver4.5.4), it is System calls more (397), and the kernel of new version also brings along new loophole and attack opportunity;
3rd, the income that attack kernel obtains is high.Kernel code is typically authorization code, and attacker would generally carry out privilege Lifting or malicious code perform operation.The some data structures of kernel are critically important for security mechanism at the same time, distort these data Structure causes Kernel security mechanism failure, carrys out shadow and hides the whereabouts of oneself so that attack is difficult to be found.
In recent years, the research hotspot of interior nuclear attack was gradually focused in the attack of data-only.It is this kind of attack with before The maximum difference of attack is that data-only attacks utilize kernel data structure, no longer to change code segment, kernel function as mesh Mark.The Attack Research for Data-only is broadly divided into two major classes both at home and abroad:Control-data is attacked and Non-control- Data is attacked.Defence for control-data attacks is studied mainly in memory safety, kernel code integrity checking In control stream integrity techniques, and the defence of non-control-data attacks is studied mainly in memory safety, memory Every in discrete data stream integrity techniques.
The mode of inward-facing nuclear attack mainly experienced 3 stages.The attack of early stage towards kernel is mainly code injection Attack, by introducing malicious code into kernel spacing, then performs this string malicious code, so as to complete to attack.For this kind of The defence method of attack mainly has kernel code integrity protection.
As that is studied for kernel attack method gos deep into, the mode of interior nuclear attack is from code injection Evolution of Attacks to control System stream hijack attack.This attack performs control stream by varying kernel, and most control stream guides execution malicious code at last, so that Complete the attack to kernel.This kind of kernel attack method usually has the attack form such as ROP, JOP.For the defender of this kind of attack Method mainly has control stream integrity protection.
There is a kind of new kernel attack pattern recent years.This kind of attack exists with interior nuclear attack difference before Only attacked in it using the data structure in kernel, this kind of data are typically safety-related data.This kind of attack has two Kind form:Control data are attacked and non-control-data attacks.Mainly there is control for the defence method of this kind of attack System stream integrity protection, detection kernel data invariant and data flow integrity protection.
In conclusion the scheme of existing linux kernel attack defending system has following deficiency:
Linux kernel attack defending system based on control stream integrality is not due to accounting for attacking for kernel data Hit, the attack towards linux kernel data can not be tackled;In addition the data flow that traditional static is analyzed can exist to dividing indirectly Branch analysis result is inaccurate, the problem of having omission.
The content of the invention
For the disadvantages described above or Improvement requirement of the prior art, the present invention provides a kind of linux kernel Data attack Detection method and system, do not account for kernel data its object is to solving existing kernel attack defense method and lead to not The technical problem for the problem of tackling kernel data attack.
As an aspect of of the present present invention, the present invention provides a kind of detection method of linux kernel Data attack, including as follows Step:
Step 1:Spent according to linux kernel data are security-related from linux kernel extracting data security-critical data;
Step 2:Linux kernel data are carried out with the data flow that static analysis obtains linux kernel data;
Step 3:Relation obtains safety-critical number between extracting security-critical data from the data flow of linux kernel data According to data flow;
Step 4:Critical data in linux kernel operational process is monitored, and with the data flow of security-critical data It is compared, if critical data deviates the data flow of security-critical data in linux kernel operational process, exports in Linux Nuclear Data is under attack, and otherwise, output linux kernel data are not affected by attack.
Preferably, security-critical data includes data relevant with access rights, the relevant data of safety inspection in step 1 And the data of unique mark.
Preferably, static analysis includes the following steps in step 2:
Step 21:Linux kernel source code is translated as underlying virtual machine intermediate language;
Step 22:Alias analysis (the Alias of stream sensitive (flow-sensitive) is carried out to underlying virtual machine intermediate language Analysis alias analysis result) is obtained;
Step 23:The data of path-sensitive (path-sensitive) are carried out using the result of alias analysis as precondition Flow point analysis obtains the data flow of linux kernel data.
As the another aspect of invention, defence method provided by the invention includes the following steps:
Step 1:Determine whether linux kernel data are under attack by the detection method;
Step 2:When critical data is under attack in linux kernel operational process, then by linux kernel operational process Critical data, which is rolled back to, is attacked preceding state;It is when critical data is not under attack in linux kernel operational process, then not right Critical data is handled in linux kernel operational process.
As another aspect of the present invention, the present invention provides a kind of detecting system, including:
Data extraction module, for being pacified according to the security-related degree of linux kernel data from linux kernel extracting data Fully closed key data;
Kernel data stream analysis module, linux kernel data are obtained for carrying out static analysis to linux kernel data Data flow;
Critical data stream analysis module, its first input end are connected with the output terminal of kernel data stream analysis module, it Two input terminals and the output terminal of data extraction module connect, for extracting safety-critical from the data flow of linux kernel data Relation obtains the data flow of security-critical data between data;
Judgment module is attacked, its input terminal is connected with the output terminal of critical data stream analysis module, for linux kernel Critical data is monitored in operational process, and compared with the data flow of security-critical data, and it is defeated according to comparative result Go out linux kernel Data attack state.
Preferably, kernel data stream analysis module includes:
Translation unit, underlying virtual machine intermediate language is translated as with translater by linux kernel source code;
The output terminal connection of alias analysis unit, its input terminal and translation unit, for underlying virtual machine intermediate language Carry out the sensitive alias analysis of stream and obtain alias analysis result;
Data-flow analysis unit, its input terminal are connected with the output terminal of alias analysis unit, for by the knot of alias analysis Fruit carries out the data flow of the data-flow analysis acquisition linux kernel data of path-sensitive as precondition.
Preferably, including the defense module that is connected of output terminal input terminal with attacking judgment module, for working as linux kernel When Data attack state is under attack, rollback processing is carried out to critical data in linux kernel operational process, is made in Linux Critical data, which returns to, in core operational process does not attack state.
In general, by the contemplated above technical scheme of the present invention compared with prior art, it can obtain down and show Beneficial effect:
(1) detection method of kernel data provided by the invention attack, first obtains the data flow of all kernel datas, from interior Security-related critical data is extracted in the data flow of Nuclear Data and forms safety-related critical data stream, and monitors kernel fortune Data flow during row, is realized to kernel data data flow attack detecting.
(2) present invention has taken into full account that the indirect branch of program data stream is intrinsic, uses the data flow point of path-sensitive Analysis can be more accurate to the indirect branch analysis result of program, effectively reduces the rate of false alarm of testing result.On the other hand, originally The alias analysis that invention uses stream sensitive can cause the result of data-flow analysis more accurately;Therefore inspection provided by the invention Survey method has high accuracy.It is only capable of compared to existing kernel data attack detecting scheme, while overcomes existing detection again The problem of kernel non-control-data attacks can not be tackled in scheme, the rate of failing to report of testing result is effectively reduced, is made Kernel data attack can accurately be detected by obtaining the program.
(3) low overhead.The present invention is using kernel data flow graph at the same time, by the non-security-critical in kernel data flow graph Data flow is rejected, and is avoided the problem of monitored data amount is excessively huge, is reduced the time overhead of system, is further increased and is The execution efficiency of system.
(4) lower coupling.The present invention is connected using simple interface between various modules, and coupling is very low, can be with Quickly complete the additions and deletions and modification of module.Allow the selection of user defined logic interface functional class, such as monitored data type.
Brief description of the drawings
Fig. 1 is the flow chart of the detection method of linux kernel Data attack provided by the invention;
Fig. 2 is that the present invention provides the principle schematic that security-critical data is extracted in detection method;
Fig. 3 is the principle schematic that the present invention provides the data flow that security-critical data is obtained in detection method;
Fig. 4 is the data flow diagram that security-critical data is obtained in detection method provided by the invention;
Fig. 5 is the functional block diagram of detecting system provided by the invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.As long as in addition, technical characteristic involved in each embodiment of invention described below Not forming conflict each other can be mutually combined.
The Integral Thought of the present invention is, collects Kernel security critical data, and obtaining Kernel security by static analysis closes The data flow diagram of key data.Linux kernel security-critical data is monitored using TSX technologies, obtains each operation for them, Analysis obtains data flow, its data flow is compared with the datagram analyzed before, judges whether it is illegal data Stream, if so, preventing and recovering.Finally, a detection defense mechanism towards direct interior nuclear attack, effectively detection are completed simultaneously Defend the attack towards Kernel security critical data.
Fig. 1 is the detection method of linux kernel Data attack provided by the invention, which includes the following steps:
Step 1:Spent according to linux kernel data are security-related from linux kernel extracting data security-critical data, As shown in Fig. 2, the quantity of security-critical data is more than the minimum data amount of generation data flow diagram
The substantial amounts of linux kernel data, for improve performance, it is necessary first to analyze linux kernel data whether with peace Total correlation, safety-related data mainly include in linux kernel data:Data relevant with access rights, safety inspection phase The data of pass, the data of unique mark shaped like uid, pid etc and with the relevant data of decision-making.
For the various complicated situation of data in linux kernel, filtering out with the relevant data of Kernel security at the same time, protecting Huge data set is reduced to smaller data set by residual according to the MDS minimum data set needed for flow graph analysis.This is substantially reduced Performance cost, while remain to the reliable accurate linux kernel data flow diagram of generation.
Step 2:Linux kernel data are carried out with the data flow diagram that static treatment obtains linux kernel data;Use static state The method of analysis portrays the data flow of linux kernel data, with thinner granularity and more flexible pattern, can be more accurate Really and efficiently describe the data flow diagram of linux kernel data.As Fig. 3 specifically comprises the following steps:
Step 21:Linux kernel source code is translated as first by LLVM IR (underlying virtual machine intermediate language) translater LLVM intermediate languages;
Step 22:Then the Pass of self-defined LLVM carries out obtained LLVM intermediate languages the sensitive alias analysis of stream;
Step 23:Then the data-flow analysis that path-sensitive is carried out using the result of alias analysis as precondition obtains The data flow diagram of linux kernel data.
Step 3:The data flow of security-related kernel data is filtered out from the data flow diagram of linux kernel data, The final data flow diagram for being depicted as linux kernel security-critical data.
Step 4:The interface provided using IntelTSX technologies writes code realization, intercepts and captures every time for safety-critical number According to relevant operation, obtain each state of security-critical data.
For each data to be monitored, obtain the operation each time for the data, and with step 3 in Linux The data flow diagram of nuclear safety critical data is compared, and whether legal analyzes operation every time.
Linux kernel security-critical data in memory is monitored using IntelTSX technologies, TSX, that is, transactional synchronization expands Exhibition, adds transaction internal memory characteristic in x86-64 instruction set.Transaction internal memory be allow in concurrent environment it is same to data structure The technology of step and efficient access.Two kinds of interfaces that we are provided by TSX technologies:HLE(Hardware Lock Elision) With RTM (RestrictedTransactional Memory).
Step 5:For defending the attack for linux kernel data, by the data flow of linux kernel security-critical data It is compared with the Kernel security critical data flow graph analyzed before, judges whether the data flow of security-critical data deviates Secure data flow.If data flow deviates the data flow diagram obtained in step (2), rollback data, recover the original shape of data State;If data flow is normal, anything is not done.
As another aspect of the present invention, the present invention provides a kind of detecting system of linux kernel Data attack.Such as Shown in Fig. 5, which includes data extraction module, kernel data stream analysis module, critical data stream analysis module, attack Judgment module and defense module, wherein, first input end and the kernel data stream analysis module of critical data stream analysis module Output terminal connection, the output terminal of the second input terminal of critical data stream analysis module and data extraction module connects, and attack judges The input terminal of module is connected with the output terminal of critical data stream analysis module.
Data extraction module, for being pacified according to the security-related degree of linux kernel data from linux kernel extracting data Fully closed key data;Kernel data stream analysis module, linux kernel number is obtained for carrying out static analysis to linux kernel data According to data flow;Critical data stream analysis module be used for from the data flow of linux kernel data extract security-critical data it Between relation obtain security-critical data data flow;Judgment module is attacked to be used for critical data in linux kernel operational process It is monitored, and linux kernel Data attack is exported compared with the data flow of security-critical data, and according to comparative result State, if critical data deviates the data flow of security-critical data in linux kernel operational process, exports linux kernel number According under attack, otherwise, output linux kernel data are not affected by attack.When linux kernel Data attack state is under attack When, defense module carries out rollback processing to critical data in linux kernel operational process, makes to close in linux kernel operational process Key data, which returns to, does not attack state.When linux kernel Data attack state for when being not affected by attack, defense module does not work.
Above-mentioned kernel data stream analysis module includes sequentially connected translation unit, alias analysis unit and data flow point Unit is analysed, translation unit is used to linux kernel source code being translated as underlying virtual machine intermediate language;Alias analysis unit be used for pair Underlying virtual machine intermediate language carries out the sensitive alias analysis of stream and obtains alias analysis result;Data-flow analysis unit is used for will be other The result of name analysis carries out the data flow of the data-flow analysis acquisition linux kernel data of path-sensitive as precondition.
As it will be easily appreciated by one skilled in the art that the foregoing is merely illustrative of the preferred embodiments of the present invention, not to The limitation present invention, all any modification, equivalent and improvement made within the spirit and principles of the invention etc., should all include Within protection scope of the present invention.

Claims (8)

1. a kind of detection method of linux kernel Data attack, it is characterised in that include the following steps:
Step 1:Spent according to linux kernel data are security-related from linux kernel extracting data security-critical data;
Step 2:Linux kernel data are carried out with the data flow that static analysis obtains linux kernel data;
Step 3:Relation obtains security-critical data between extracting security-critical data from the data flow of linux kernel data Data flow;
Step 4:Critical data in linux kernel operational process is monitored, and is carried out with the data flow of security-critical data Compare, if critical data deviates the data flow of security-critical data in linux kernel operational process, export linux kernel number According under attack, otherwise, output linux kernel data are not affected by attack.
2. detection method as claimed in claim 1, it is characterised in that security-critical data includes and access rights in step 1 The data of relevant data, the relevant data of safety inspection and unique mark.
3. detection method as claimed in claim 1 or 2, it is characterised in that static analysis includes the following steps in step 2:
Step 21:Linux kernel source code is translated as underlying virtual machine intermediate language;
Step 22:The sensitive alias analysis of stream is carried out to underlying virtual machine intermediate language and obtains alias analysis result;
Step 23:The data-flow analysis that path-sensitive is carried out using the result of alias analysis as precondition obtains linux kernel The data flow of data.
4. such as claims 1 to 3 any one of them detection method, it is characterised in that realized by IntelTSX technologies to right Critical data is monitored in linux kernel operational process.
5. a kind of defence method of the detection method based on described in claim 1, it is characterised in that include the following steps:
Step 1:Determine whether linux kernel data are under attack by the detection method;
Step 2:, then will be crucial in linux kernel operational process when critical data is under attack in linux kernel operational process Data rewind is extremely attacked preceding state;When critical data is not under attack in linux kernel operational process, then not to Linux Critical data is handled in kernel operational process.
A kind of 6. detecting system of the detection method based on described in claim 1, it is characterised in that including:
Data extraction module, for being closed safely from linux kernel extracting data according to the security-related degree of linux kernel data Key data;
Kernel data stream analysis module, the data for obtaining linux kernel data for linux kernel data to be carried out with static analysis Stream;
Critical data stream analysis module, its first input end are connected with the output terminal of kernel data stream analysis module, it is second defeated The output terminal for entering end and data extraction module connects, for extracting security-critical data from the data flow of linux kernel data Between relation obtain security-critical data data flow;
Judgment module is attacked, its input terminal is connected with the output terminal of critical data stream analysis module, for being run to linux kernel During critical data be monitored, and exported compared with the data flow of security-critical data, and according to comparative result Linux kernel Data attack state.
7. detecting system as claimed in claim 6, it is characterised in that kernel data stream analysis module includes:
Translation unit, underlying virtual machine intermediate language is translated as with translater by linux kernel source code;
The output terminal connection of alias analysis unit, its input terminal and translation unit, for being carried out to underlying virtual machine intermediate language The sensitive alias analysis of stream obtains alias analysis result;
Data-flow analysis unit, its input terminal are connected with the output terminal of alias analysis unit, for the result of alias analysis to be made The data flow of the data-flow analysis acquisition linux kernel data of path-sensitive is carried out for precondition.
8. detecting system as claimed in claims 6 or 7, it is characterised in that the output including input terminal with attack judgment module Hold connection defense module, for when linux kernel Data attack state for it is under attack when, to linux kernel operational process Middle critical data carries out rollback processing, returns in linux kernel operational process critical data and does not attack state.
CN201711205897.1A 2017-11-27 2017-11-27 Detection method, defense method and system for Linux kernel data attack Active CN107967426B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711205897.1A CN107967426B (en) 2017-11-27 2017-11-27 Detection method, defense method and system for Linux kernel data attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711205897.1A CN107967426B (en) 2017-11-27 2017-11-27 Detection method, defense method and system for Linux kernel data attack

Publications (2)

Publication Number Publication Date
CN107967426A true CN107967426A (en) 2018-04-27
CN107967426B CN107967426B (en) 2020-07-03

Family

ID=61998610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711205897.1A Active CN107967426B (en) 2017-11-27 2017-11-27 Detection method, defense method and system for Linux kernel data attack

Country Status (1)

Country Link
CN (1) CN107967426B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111666216A (en) * 2020-06-05 2020-09-15 中国银行股份有限公司 Intelligent contract analysis method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101473300A (en) * 2006-06-23 2009-07-01 微软公司 Securing software by enforcing data flow integrity
CN104182688A (en) * 2014-08-26 2014-12-03 北京软安科技有限公司 Android malicious code detection device and method based on dynamic activation and behavior monitoring
CN106570394A (en) * 2016-11-10 2017-04-19 厦门安胜网络科技有限公司 Method for detecting rogue programs

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101473300A (en) * 2006-06-23 2009-07-01 微软公司 Securing software by enforcing data flow integrity
CN104182688A (en) * 2014-08-26 2014-12-03 北京软安科技有限公司 Android malicious code detection device and method based on dynamic activation and behavior monitoring
CN106570394A (en) * 2016-11-10 2017-04-19 厦门安胜网络科技有限公司 Method for detecting rogue programs

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111666216A (en) * 2020-06-05 2020-09-15 中国银行股份有限公司 Intelligent contract analysis method and device
CN111666216B (en) * 2020-06-05 2024-01-23 中国银行股份有限公司 Intelligent contract analysis method and device

Also Published As

Publication number Publication date
CN107967426B (en) 2020-07-03

Similar Documents

Publication Publication Date Title
Xu et al. Malware detection using machine learning based analysis of virtual memory access patterns
Hu et al. Enforcing unique code target property for control-flow integrity
CN103500308A (en) System and method for countering detection of emulation by malware
Pfaff et al. Learning how to prevent return-oriented programming efficiently
KR101640479B1 (en) Software vulnerability attack behavior analysis system based on the source code
Basu et al. Preempt: Preempting malware by examining embedded processor traces
Pan et al. Automated detection of spectre and meltdown attacks using explainable machine learning
CN110647748B (en) Code multiplexing attack detection system and method based on hardware characteristics
Kollenda et al. Towards automated discovery of crash-resistant primitives in binary executables
Rajput et al. Remote non-intrusive malware detection for plcs based on chain of trust rooted in hardware
Qiu et al. A framework for understanding dynamic anti-analysis defenses
Wang et al. Branch obfuscation using code mobility and signal
CN107967426A (en) A kind of detection method, defence method and the system of linux kernel Data attack
Zhou et al. The final security problem in IOT: Don’t count on the canary!
Xing et al. The devil is in the detail: Generating system call whitelist for Linux seccomp
Jiang et al. Efficient and trusted detection of rootkit in IoT devices via offline profiling and online monitoring
Rohan et al. Can monitoring system state+ counting custom instruction sequences aid malware detection?
Albalawi et al. Protecting Shared Virtualized Environments against Cache Side-channel Attacks.
CN105005737A (en) Branch prediction attack oriented micro-architecture level safety protection method
Ding et al. Desensitization: Privacy-aware and attack-preserving crash report
Garcia-Cervigon et al. Browser function calls modeling for banking malware detection
CN115033411A (en) Hardware detection and defense mechanism for microprocessor buffer overflow
CN114647845A (en) Detection and identification method and device for malicious sample delay codes
Leon et al. Counter-measures against stack buffer overflows in GNU/Linux operating systems
KR101421630B1 (en) system and method for detecting code-injected malicious code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant