2 research outputs found

    An Empirical Study of Reflection Attacks Using NetFlow Data

    Get PDF
    We would like to thank the anonymous reviewers for their constructive feedback, which helped improve our paper significantly.Peer reviewe

    Using hardware performance counters to detect control hijacking attacks

    No full text
    Code reuse techniques can circumvent existing security measures. For example, attacks such as Return Oriented Programming (ROP) use fragments of the existing code base to create an attack. Since this code is already in the system, the Data Execution Prevention methods cannot prevent the execution of this reorganised code. Existing software-based Control Flow Integrity can prevent this attack, but the overhead is enormous. Most of the improved methods utilise reduced granularity in exchange for a small performance overhead. Hardware-based detection also faces the same performance overhead and accuracy issues. Benefit from HPC's large-area loading on modern CPU chips, we propose a detection method based on the monitoring of hardware performance counters, which is a lightweight system-level detection for malicious code execution to solve the restrictions of other software and hardware security measures, and is not as complicated as Control Flow Integrity.</p
    corecore