Back to Results
First PageMeta Content
Machine code / X86 instructions / Shellcode / Software bugs / X86 architecture / Buffer overflow / Self-modifying code / CPUID / NOP / Computer architecture / Computing / Cyberwarfare


Using Instruction Sequence Abstraction for Shellcode Detection and Attribution Ziming Zhao and Gail-Joon Ahn Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA
Add to Reading List

Document Date: 2013-07-11 17:06:53


Open Document

File Size: 464,23 KB

Share Result on Facebook

City

Markovchain / /

Company

Pearson / S&P / Intel / Gail-Joon Ahn Laboratory / /

/

Facility

Gail-Joon Ahn Laboratory of Security Engineering / Arizona State University / /

IndustryTerm

online detection / neural networks / exploits and tools / on-line shellcode detection / static analysis solutions / linear sweep disassembly algorithm / external devices / on-line data stream / computing / basic disassembly algorithms / net-centric production systems / /

OperatingSystem

Unix / Windows 7 / Linux / OSX / FreeBSD / Solaris / Microsoft Windows / Windows NT / /

Organization

World Health Organization / National Science Foundation / Department of Energy / U.S. Securities and Exchange Commission / Arizona State University / /

/

Position

algorithm and feature extractor / Extractor Data Representations Opcode Feature Extraction Fig / Markov-chain-based model for shell- code detection / feature extractor / representative / /

Product

Markov / Metasploit / Gamma / Windows API GetTickCount / /

ProgrammingLanguage

C / /

PublishedMedium

The Computer Journal / The Journal of Machine Learning Research / /

Technology

alpha / adc / Linux / Unix / API / learning-based algorithms / machine learning / operating system / linear sweep disassembly algorithm / Input Processor / cmp / training algorithm / two basic disassembly algorithms / /

URL

http /

SocialTag