Argos
- 18 April 2006
- journal article
- conference paper
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 40 (4) , 15-27
- https://doi.org/10.1145/1218063.1217938
Abstract
As modern operating systems and software become larger and more complex, they are more likely to contain bugs, which may allow attackers to gain illegitimate access. A fast and reliable mechanism to discern and generate vaccines for such attacks is vital for the successful protection of networks and systems. In this paper we present Argos, a containment environment for worms as well as human orchestrated attacks. Argos is built upon a fast x86 emulator which tracks network data throughout execution to identify their invalid use as jump targets, function addresses, instructions, etc. Furthermore, system call policies disallow the use of network data as arguments to certain calls. When an attack is detected, we perform 'intelligent' process- or kernel-aware logging of the corresponding emulator state for further offline processing. In addition, our own forensics shellcode is injected, replacing the malevolent shellcode, to gather information about the attacked process. By correlating the data logged by the emulator with the data collected from the network, we are able to generate accurate network intrusion detection signatures for the exploits that are immune to payload mutations. The entire process can be automated and has few if any false positives, thus rapid global scale deployment of the signatures is possible.Keywords
This publication has 11 references indexed in Scilit:
- SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypotsComputer Networks, 2007
- Practical taint-based protection using demand emulationPublished by Association for Computing Machinery (ACM) ,2006
- Towards Software-Based Signature Detection for Intrusion Prevention on the Network CardPublished by Springer Nature ,2006
- Minos: Control Data Attack Prevention Orthogonal to Memory ModelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- VigilantePublished by Association for Computing Machinery (ACM) ,2005
- Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown VulnerabilitiesPublished by Springer Nature ,2005
- Secure program execution via dynamic information flow trackingPublished by Association for Computing Machinery (ACM) ,2004
- Randomized instruction set emulation to disrupt binary code injection attacksPublished by Association for Computing Machinery (ACM) ,2003
- Detection of injected, dynamically generated, and obfuscated malicious codePublished by Association for Computing Machinery (ACM) ,2003
- Countering code-injection attacks with instruction-set randomizationPublished by Association for Computing Machinery (ACM) ,2003