DocumentCode :
3666551
Title :
Multi-variant execution to protect unpatched software
Author :
Kevin Bauer;Veer Dedhia;Richard Skowyra;William Streilein;Hamed Okhravi
Author_Institution :
MIT Lincoln Laboratory
fYear :
2015
fDate :
8/1/2015 12:00:00 AM
Firstpage :
1
Lastpage :
6
Abstract :
For a variety of economic and practical reasons, security patches often cannot be deployed immediately after a patch´s release. To mitigate attacks against unpatched software, we present the design and evaluation of a Moving Target technique that uses a form of software diversity called multi-variant execution. Our technique decomposes the software´s behavior into its low-level system calls and compares unpatched and patched execution traces to identify malicious behavior in the unpatched software. We evaluate our approach on benign and malicious document samples and our results indicate that multi-variant execution can detect real exploits with low false positives.
Keywords :
"Software","Malware","Portable document format","Monitoring","Measurement","Prototypes"
Publisher :
ieee
Conference_Titel :
Resilience Week (RWS), 2015
Type :
conf
DOI :
10.1109/RWEEK.2015.7287427
Filename :
7287427
Link To Document :
بازگشت