Detection of injected, dynamically generated, and obfuscated malicious code

  • Authors:
  • Jesse C. Rabek;Roger I. Khazan;Scott M. Lewandowski;Robert K. Cunningham

  • Affiliations:
  • Massachusetts Institute of Technology, Lexington, MA;Massachusetts Institute of Technology, Lexington, MA;Massachusetts Institute of Technology, Lexington, MA;Massachusetts Institute of Technology, Lexington, MA

  • Venue:
  • Proceedings of the 2003 ACM workshop on Rapid malcode
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locations (virtual addresses) of system calls within the software executables, and then monitors the executables at runtime to verify that every observed system call is made from a location identified using static analysis. The power of this technique is that it is simple, practical, applicable to real-world software, and highly effective against injected, dynamically generated, and obfuscated malicious code.