Multi-variant execution to protect unpatched software

2015 Resilience Week (RWS)(2015)

引用 2|浏览47
暂无评分
摘要
For a variety of economic and practical reasons, security patches often cannot be deployed immediately after a patch's release. To mitigate attacks against unpatched software, we present the design and evaluation of a Moving Target technique that uses a form of software diversity called multi-variant execution. Our technique decomposes the software's behavior into its low-level system calls and compares unpatched and patched execution traces to identify malicious behavior in the unpatched software. We evaluate our approach on benign and malicious document samples and our results indicate that multi-variant execution can detect real exploits with low false positives.
更多
查看译文
关键词
multivariant execution,unpatched software protection,moving target technique,software diversity,software low-level system calls
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要