Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Methods, media, and systems for detecting attack on a digital processing device

Patent ·
OSTI ID:1344482

Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

Research Organization:
Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC05-76RL01830
Assignee:
The Trustees of Columbia University in the City of New York
Patent Number(s):
9,576,127
Application Number:
14/336,649
OSTI ID:
1344482
Country of Publication:
United States
Language:
English

References (44)

Evading network anomaly detection systems: formal reasoning and practical techniques conference January 2006
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks book January 2005
Service specific anomaly detection for network intrusion detection conference January 2002
N-gram-based detection of new malicious code conference January 2004
Towards Stealthy Malware Detection book January 2007
The Mahalanobis distance journal January 2000
Fast and automated generation of attack signatures: a basis for building self-protecting servers conference January 2005
FLIPS: Hybrid Adaptive Intrusion Prevention book January 2006
A Study of Malcode-Bearing Documents book January 2007
Intrusion detection via static analysis conference January 2001
Space/time trade-offs in hash coding with allowable errors journal July 1970
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses book January 2002
"Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector conference January 2002
Undermining an Anomaly-Based Intrusion Detection System Using Common Exploits book January 2002
Content based file type detection algorithms conference January 2003
Misleading worm signature generators using deliberate noise injection conference January 2006
Deep packet inspection using parallel Bloom filters conference January 2003
Data mining methods for detection of new malicious executables conference January 2001
SigFree: A Signature-Free Buffer Overflow Attack Blocker journal January 2010
Randomized instruction set emulation to disrupt binary code injection attacks
  • Barrantes, Elena Gabriela; Ackley, David H.; Palmer, Trek S.
  • CCS '03 Proceedings of the 10th ACM conference on Computer and communications security, p. 281-289 https://doi.org/10.1145/948109.948147
conference January 2003
On the effectiveness of address-space randomization conference January 2004
Fileprints: identifying file types by n-gram analysis conference January 2005
Malware phylogeny generation using permutations of code journal September 2005
Polygraph: Automatically Generating Signatures for Polymorphic Worms conference January 2005
Specification-based anomaly detection: a new approach for detecting network intrusions conference January 2002
Macro virus identification problems journal January 1998
A sense of self for Unix processes conference January 1996
Paragraph: Thwarting Signature Learning by Training Maliciously book January 2006
Anomalous Payload-Based Network Intrusion Detection book January 2004
Instance-based learning algorithms journal January 1991
Can machine learning be secure?
  • Barreno, Marco; Nelson, Blaine; Sears, Russell
  • ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security, p. 16-25 https://doi.org/10.1145/1128817.1128824
conference January 2006
Honeycomb: creating intrusion detection signatures using honeypots journal January 2004
A linear space algorithm for computing maximal common subsequences journal June 1975
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack book January 2006
Polymorphic Worm Detection Using Structural Information of Executables book January 2006
Characterizing the behavior of a program using multiple-length N-grams conference January 2000
Countering code-injection attacks with instruction-set randomization
  • Kc, Gaurav S.; Keromytis, Angelos D.; Prevelakis, Vassilis
  • CCS '03 Proceedings of the 10th ACM conference on Computer and communications security, p. 272-280 https://doi.org/10.1145/948109.948146
conference January 2003
Toward Automated Dynamic Malware Analysis Using CWSandbox journal March 2007
Anomaly detection using call stack information conference January 2003
Shield: vulnerability-driven network filters for preventing known vulnerability exploits
  • Wang, Helen J.; Guo, Chuanxiong; Simon, Daniel R.
  • Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, p. 193-204 https://doi.org/10.1145/1015467.1015489
conference January 2004
Mimicry attacks on host-based intrusion detection systems conference January 2002
Anomalous Payload-Based Worm Detection and Signature Generation book January 2006
On the infeasibility of modeling polymorphic shellcode conference January 2007
Nearest neighbor pattern classification journal January 1967