Presentation | 2014/5/15 Proposal for Shellcode Extraction from Malicious Document File KAZUKI IWAMOTO, MASAKI KAMIZONO, Yu TSUDA, TAKASHI TOMINE, DAISUKE INOUE, KOJI NAKAO, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The following document is an analysis of malicious documents which exploit vulnerability in applications dynamically, the application must have appropriate vulnerability. Therefore, we have to analyze the document statically to identify the type of vulnerability. Moreover it is difficult to identify unknown vulnerability, and the application may not be available even if we could identify the type of vulnerability. However malicious code which is executed after exploiting does not have relation with vulnerability in many cases. In this paper, we propose a method to extract and execute shellcode for analyzing malicious documents without identification of vulnerability and application. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | |
Paper # | Vol.2014-CSEC-65 No.13,Vol.2014-IOT-25 No.13 |
Date of Issue |
Conference Information | |
Committee | ICM |
---|---|
Conference Date | 2014/5/15(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication Management(ICM) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Proposal for Shellcode Extraction from Malicious Document File |
Sub Title (in English) | |
Keyword(1) | |
1st Author's Name | KAZUKI IWAMOTO |
1st Author's Affiliation | Advanced Research Laboratory, SecureBrain Corporation:Interdisciplinary Graduate School of Science and Technology, Shinshu University() |
2nd Author's Name | MASAKI KAMIZONO |
2nd Author's Affiliation | National Institute of Information and Communications Technology:Advanced Research Laboratory, SecureBrain Corporation |
3rd Author's Name | Yu TSUDA |
3rd Author's Affiliation | National Institute of Information and Communications Technology |
4th Author's Name | TAKASHI TOMINE |
4th Author's Affiliation | National Institute of Information and Communications Technology |
5th Author's Name | DAISUKE INOUE |
5th Author's Affiliation | National Institute of Information and Communications Technology |
6th Author's Name | KOJI NAKAO |
6th Author's Affiliation | National Institute of Information and Communications Technology |
Date | 2014/5/15 |
Paper # | Vol.2014-CSEC-65 No.13,Vol.2014-IOT-25 No.13 |
Volume (vol) | vol.114 |
Number (no) | 43 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |