Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks

  • Authors:
  • Makoto Shimamura;Kenji Kono

  • Affiliations:
  • Department of Information and Computer Science, Keio University,;Department of Information and Computer Science, Keio University, and CREST, Japan Science and Technology Agency,

  • Venue:
  • DIMVA '09 Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode ), some researchers have proposed network-level code emulators. A network-level code emulator can detect shellcode accurately and help analysts to understand the behavior of shellcode. We demonstrated that memory-scanning attacks can evade current emulators, and propose Yataglass, an elaborated network-level code emulator, that enables us to analyze shellcode that incorporates memory-scanning attacks. According to our experimental results, Yataglass successfully emulated and analyzed real shellcode into which we had manually incorporated memory-scanning attacks.