A polymorphic shellcode detection mechanism in the network

  • Authors:
  • Hsiang-Lun Huang;Tzong-Jye Liu;Kuong-Ho Chen;Chyi-Ren Dow;Lih-Chyau Wuu

  • Affiliations:
  • Feng Chia University, Taichung, Taiwan, R.O.C.;Feng Chia University, Taichung, Taiwan, R.O.C.;Feng Chia University, Taichung, Taiwan, R.O.C.;Feng Chia University, Taichung, Taiwan, R.O.C.;National Yunlin University of Science and Technology, Yunlin, Taiwan, R.O.C.

  • Venue:
  • Proceedings of the 2nd international conference on Scalable information systems
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Buffer overflow attack is a major security problem in recent years. The polymorphism technique for shellcode becomes more and more popular along with development of Internet. This paper proposes a method to detect the polymorphic shellcode for Windows operating system. The proposed approach relies on an IA-32 CPU emulator that executes instruction sequences and analyze the behavior of polymorphic shellcode. The experimental results show that the approach is able to detect polymorphic shellcode accurately.