发明名称 DETECTING EXPLOIT CODE IN NETWORK FLOWS
摘要 Disclosed is a method and apparatus for detecting exploit code in network flows. Network data packets are intercepted by a flow monitor which generates data flows from the intercepted data packets. A content filter filters out legitimate programs from the data flows, and the unfiltered portions are provided to a code recognizer which detects executable code. Any embedded executable code in the unfiltered data flow portions is identified as a suspected exploit in the network flow. The executable code recognizer executable code by performing convergent binary disassembly on the unfiltered portions of the data flows. The executable code recognizer then constructs a control flow graph and performs control flow analysis, data flow analysis, and constraint enforcement in order to detect executable code. In addition to identifying detected executable code as a potential exploit, the detected executable code may then be used in order to generate a signature of the potential exploit, for use by other systems in detecting the exploit.
申请公布号 WO2007001439(A2) 申请公布日期 2007.01.04
申请号 WO2005US39437 申请日期 2005.10.28
申请人 TELCORDIA TECHNOLOGIES, INC.;VAN DEN BERG, ERIC;CHINCHANI, RAMKUMAR 发明人 VAN DEN BERG, ERIC;CHINCHANI, RAMKUMAR
分类号 G06F9/45 主分类号 G06F9/45
代理机构 代理人
主权项
地址