SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data

  • Jonathan Christofer Demay
  • , Eric Totel
  • , Frédéric Tronel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Anomaly based intrusion detection systems rely on the build of a normal behavior model. When a deviation from this normal behavior is detected, an alert is raised. This anomaly approach, unlike the misuse approach, is able to detect unknown attacks. A basic technique to build such a model for a program is to use the system call sequences of the process. To improve the accuracy and completeness of this detection model, we can add information related to the system call, such as its arguments or its execution context. But even then, attacks that target non-control-data may be missed and attacks on control-data may be adapted to bypass the detection mechanism using evasion techniques. We propose in this article an approach that focuses on the detection of non-control-data attacks. Our approach aims at exploiting the internal state of a program to detect a memory corruption on non-control-data that could lead to an illegal system call. To achieve this, we propose to build a data-oriented detection model by statically analyzing a program source code. This model is used to instrument the program by adding reasonableness checks that verify the consistent state of the data items the system calls depend on. We thus argue that it is possible to detect a program misuse issued by a non-control-data attack inside the program during its execution. While keeping a low overhead, this approach allows to detect non-control-data attacks.

Original languageEnglish
Title of host publicationPost-Proceedings of the 4th International Conference on Risks and Security of Internet and Systems, CRiSIS 2009
Pages51-58
Number of pages8
DOIs
Publication statusPublished - 1 Dec 2009
Externally publishedYes
Event4th International Conference on Risks and Security of Internet and Systems, CRiSIS 2009 - Toulouse, France
Duration: 19 Oct 200922 Oct 2009

Publication series

NamePost-Proceedings of the 4th International Conference on Risks and Security of Internet and Systems, CRiSIS 2009

Conference

Conference4th International Conference on Risks and Security of Internet and Systems, CRiSIS 2009
Country/TerritoryFrance
CityToulouse
Period19/10/0922/10/09

Fingerprint

Dive into the research topics of 'SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data'. Together they form a unique fingerprint.

Cite this