On the infeasibility of modeling polymorphic shellcode
- 28 October 2007
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 541-551
- https://doi.org/10.1145/1315245.1315312
Abstract
Polymorphic malcode remains a troubling threat. The ability for malcode to automatically transform into semantically equivalent variants frustrates attempts to rapidly construct a single , simple, easily verifiable representation. We present a quantitative analy- sis of the strengths and limitations of shellcode polymorphism and consider its impact on current intrusion detection practic e. We focus on the nature of shellcode decoding routines. The em- pirical evidence we gather helps show that modeling the class of self-modifying code is likely intractable by known methods, in- cluding both statistical constructs and string signatures . In addi- tion, we develop and present measures that provide insight into the capabilities, strengths, and weaknesses of polymorphic engines. In order to explore countermeasures to future polymorphic threats, we show how to improve polymorphic techniques and create a proof- of-concept engine expressing these improvements. Our results indicate that the class of polymorphic behavior is too greatly spread and varied to model effectively. Our analysis also supplies a novel way to understand the limitations of current signature-based techniques. We conclude that modeling normal content is ultimately a more promising defense mechanism than modeling malicious or abnormal content.Keywords
This publication has 21 references indexed in Scilit:
- FLIPS: Hybrid Adaptive Intrusion PreventionPublished by Springer Nature ,2006
- A Fast Static Analysis Approach to Detect Exploit Code Inside Network FlowsPublished by Springer Nature ,2006
- Anomalous Payload-Based Worm Detection and Signature GenerationPublished by Springer Nature ,2006
- Polymorphic Worm Detection Using Structural Information of ExecutablesPublished by Springer Nature ,2006
- Anagram: A Content Anomaly Detector Resistant to Mimicry AttackPublished by Springer Nature ,2006
- Network–Level Polymorphic Shellcode Detection Using EmulationPublished by Springer Nature ,2006
- Detecting past and present intrusions through vulnerability-specific predicatesPublished by Association for Computing Machinery (ACM) ,2005
- A Dynamic Mechanism for Recovering from Buffer Overflow AttacksPublished by Springer Nature ,2005
- ValgrindElectronic Notes in Theoretical Computer Science, 2003
- Reliable identification of bounded-length viruses is NP-completeIEEE Transactions on Information Theory, 2003