Please use this identifier to cite or link to this item: https://doi.org/10.1145/1181309.1181312
Title: Hunting Trojan Horses
Authors: Moffie, M.
Cheng, W.
Kaeli, D.
Zhao, Q. 
Keywords: Data labeling
Information flow control
Program monitoring
Run time environment
Issue Date: 2006
Citation: Moffie, M.,Cheng, W.,Kaeli, D.,Zhao, Q. (2006). Hunting Trojan Horses. ASID'06: 1st Workshop on Architectural and System Support for Improving Software Dependability : 12-17. ScholarBank@NUS Repository. https://doi.org/10.1145/1181309.1181312
Abstract: HTH (Hunting Trojan Horses) is a security framework developed for detecting difficult types of intrusions. HTH is intended as a complement to anti-virus software in that it targets unknown and zero-day Trojan Horses and Backdoors. In order to accurately identify these types of attacks HTH utilizes runtime information available during execution. The information collected includes fine-grained information flow, program execution flow and resources used.In this paper we present Harrier, an Application Security Monitor at the heart of our HTH framework. Harrier is an efficient run-time monitor that dynamically collects execution-related data. Harrier is capable of collecting information across different abstraction levels including architectural, system and library APIs. To date, Harrier is 3-4 times faster than comparable information flow tracking systems.Using the collected information, Harrier allows for accurate identification of abnormal program behavior. Preliminary results show a good detection rate with a low rate of false positives. Copyright 2006 ACM.
Source Title: ASID'06: 1st Workshop on Architectural and System Support for Improving Software Dependability
URI: http://scholarbank.nus.edu.sg/handle/10635/114663
ISBN: 1595935762
DOI: 10.1145/1181309.1181312
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.