Gesellschaft fr Informatik e.V.

Lecture Notes in Informatics


Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6.7, 2004 P-46, 161-173 (2004).

GI, Gesellschaft für Informatik, Bonn
2004


Editors

Ulrich Flegel, Michael Meier (eds.)


Copyright © GI, Gesellschaft für Informatik, Bonn

Contents

Structural comparison of executable objects

Halvar Flake

Abstract


A method to heuristically construct an isomorphism between the sets of functions in two similar but differing versions of the same executable file is presented. Such an isomorphism has multiple practical applications, specifically the ability to detect programmatic changes between the two executable versions. Moreover, information (function names) which is available for one of the two versions can also be made available for the other . A framework implementing the described methods is presented, along with empirical data about its performance when used to analyze patches to recent security vulnerabilities. As a more practical example, a security update which fixes a critical vulnerability in an H.323 parsing component is analyzed, the relevant vulnerability extracted and the implications of the vulnerability and the fix discussed.


Full Text: PDF

GI, Gesellschaft für Informatik, Bonn
ISBN 3-88579-375-X


Last changed 24.01.2012 21:45:58