{"title":"利用组合搜索扩展高级逃避技术","authors":"M'hamed Chammem, Mohamed Hamdi, Tai-hoon Kim","doi":"10.1109/SECTECH.2014.18","DOIUrl":null,"url":null,"abstract":"In this paper, we extend the concept of Advanced Evasion Techniques (AETs) by exploring new alternatives to reduce the complexity of existing evasion tools. The major objective is to enhance the security testing potential brought by AETs by increasing the number of combinations that can be tested and checked on the Device Under Test (DUT). We analyze the performance of non-exhaustive search strategies by the use of clusters where multiple evasion techniques are combined. To this end, we propose the use of probabilistic trees to design scenario-based AETs where multiple architectures are considered. For an accurate analysis of the contribution resulting from the proposed idea, we illustrate our idea using a practical evasion tool, namely the EVADER tool designed by McAfee.","PeriodicalId":159028,"journal":{"name":"2014 7th International Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Extending Advanced Evasion Techniques Using Combinatorial Search\",\"authors\":\"M'hamed Chammem, Mohamed Hamdi, Tai-hoon Kim\",\"doi\":\"10.1109/SECTECH.2014.18\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we extend the concept of Advanced Evasion Techniques (AETs) by exploring new alternatives to reduce the complexity of existing evasion tools. The major objective is to enhance the security testing potential brought by AETs by increasing the number of combinations that can be tested and checked on the Device Under Test (DUT). We analyze the performance of non-exhaustive search strategies by the use of clusters where multiple evasion techniques are combined. To this end, we propose the use of probabilistic trees to design scenario-based AETs where multiple architectures are considered. For an accurate analysis of the contribution resulting from the proposed idea, we illustrate our idea using a practical evasion tool, namely the EVADER tool designed by McAfee.\",\"PeriodicalId\":159028,\"journal\":{\"name\":\"2014 7th International Conference on Security Technology\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 7th International Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECTECH.2014.18\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 7th International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2014.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Extending Advanced Evasion Techniques Using Combinatorial Search
In this paper, we extend the concept of Advanced Evasion Techniques (AETs) by exploring new alternatives to reduce the complexity of existing evasion tools. The major objective is to enhance the security testing potential brought by AETs by increasing the number of combinations that can be tested and checked on the Device Under Test (DUT). We analyze the performance of non-exhaustive search strategies by the use of clusters where multiple evasion techniques are combined. To this end, we propose the use of probabilistic trees to design scenario-based AETs where multiple architectures are considered. For an accurate analysis of the contribution resulting from the proposed idea, we illustrate our idea using a practical evasion tool, namely the EVADER tool designed by McAfee.