A Detection method based on Control Flow Graph for Cisco IOS Security
Abstract
Aiming at the problem of current analysis and detection techniques against Cisco IOS security are not suitable for IOS integrality attack, this paper focuses on the Cisco IOS security detection techniques based on Control Flow Graph. First, the constructing method of Control Flow Graph is introduced. Then, a method to extract non-executed malicious code is proposed, which improves the effectiveness and accuracy of the analysis of malicious code. It provides support for rapid and effective detection of IOS integrality attack.
Keywords
Cisco IOS; Control Flow Graph; integrality; security detection
Full Text:
PDFRefbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License