Abstract
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and prevention. Eudaemon is able to attach to any running process, and redirect execution to a user-space emulator that will dynamically instrument the binary by means of taint analysis. Any attempts to subvert control flow, or to inject malicious code will be detected and averted. When desired Eudaemon can reattach itself to the emulated process, and return execution to the native binary. Selective emulation has been investigated before as a mean to heal an attacked program or to generate a vaccine after an attack is detected, by applying intensive instrumentation to the vulnerable region of the program. Eudaemon can move an application between protected and native mode at will, e.g., when spare cycles are available, when a system policy ordains it, or when it is explicitly requested. The transition is performed transparently and in very little time, thus incurring minimal disturbance to an actively used system Systems offering constant protection against similar attacks have also been proposed, but require access to source code or explicit operating system support, and often induce significant performance penalties We believe that Eudaemon offers a flexible mechanism to detect a series of attacks in end-user systems with acceptable overhead. Moreover, we require no modification to the running system and/or installation of a hypervisor, with an eye on putting taint analysis within reach of the average user.
| Original language | English |
|---|---|
| Title of host publication | EuroSys'08 - Proceedings of the EuroSys 2008 Conference |
| Pages | 287-299 |
| Number of pages | 13 |
| DOIs | |
| State | Published - 1 Apr 2008 |
| Event | 3rd ACM European Conference on Computer Systems, EuroSys 2008 - Glasgow, United Kingdom Duration: 31 Mar 2008 → 4 Apr 2008 |
Publication series
| Name | aEuroSys'08 - Proceedings of the EuroSys 2008 Conference |
|---|
Conference
| Conference | 3rd ACM European Conference on Computer Systems, EuroSys 2008 |
|---|---|
| Country/Territory | United Kingdom |
| City | Glasgow |
| Period | 31/03/08 → 4/04/08 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 3 Good Health and Well-being
Keywords
- Honeypots
- Operating systems
- Security
Fingerprint
Dive into the research topics of 'Eudaemon: Involuntary and on-demand emulation against zero-day exploits'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver