NUST Institutional Repository

Detection of Heap-Based Overflow in binary Codes

Show simple item record

dc.contributor.author Siddiquie, Huma
dc.contributor.author Supervised by Dr Muhammad Faisal Amjad.
dc.date.accessioned 2020-10-27T07:44:08Z
dc.date.available 2020-10-27T07:44:08Z
dc.date.issued 2018-08
dc.identifier.other TIS-294
dc.identifier.other MSIS-14
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/5817
dc.description.abstract According to SANS Common weakness Enumeration Heap Overflow vulnerability is among twenty five most dangerous software errors which if exploited in an organized manner aids the attacker to gain privilege escalation. Detection of malwares that can exploit this vulnerability requires the combination of datamining and machine learning techniques. Our work presents a hybrid malware detection technique that is the combination of both data mining and machine learning approach. For overcoming the absence of typical anti-virus software we have used static analysis technique to extract features of malwares. We extracted features from malware binaries then calling frequencies of the raw features are collected to select valuable features. Feature engineering technique is used for the reduction of the selected features. The created feature set is used to train three classifiers J48, K-Star and Simple logistic for the detection of malwares that exploit heap based overflow vulnerability. By embracing the notion of machine learning and datamining a static malware detection technique is proposed. The proposed technique is easy to implement in operations of cyber security to comprehend the behavior of malwares targeting their organizations. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Detection of Heap-Based Overflow in binary Codes en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account