quire different verification methods compared to pre-
viously known approaches. We presented the replay
mechanism “exact stream replay” as a way to verify
SCAs. Our proof-of-cocept implementation used the
DTA honeypot Argos and it was evaluated with 24
real-world attacks using exact stream replay. SCAs
were successfully generated and verified for 22 of
these attacks (the remaining 2 could not be detected
by Argos), and the overall life cycle from detection to
verification was shown to be on average less than 2
seconds. Finally, we showed that packet-based SCAs
perform better for bigger SCA file sizes and seem to
have a much better worst-case performance than con-
ventional SCAs. For future work we plan to investi-
gate accuracy and performance of client-side attacks
and attacks on newer operating systems and mobile
devices.
REFERENCES
Bailey, M., Cooke, E., Jahanian, F., Watson, D., and
Nazario, J. (2005). The blaster worm: Then and now.
Security & Privacy, IEEE, 3(4):26–31.
Bilge, L. and Dumitras, T. (2012). Before we knew it: an
empirical study of zero-day attacks in the real world.
In Proceedings of the 2012 ACM conference on Com-
puter and communications security, pages 833–844.
ACM.
Bosman, E., Slowinska, A., and Bos, H. (2011). Minemu:
The worlds fastest taint tracker. In Recent Advances
in Intrusion Detection, pages 1–20. Springer.
Clause, J., Li, W., and Orso, A. (2007). Dytan: a generic
dynamic taint analysis framework. In Proceedings of
the 2007 international symposium on Software testing
and analysis, pages 196–206. ACM.
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Shan-
non, C., and Brown, J. (2004). Can we contain inter-
net worms. In Proceedings of the 3rd Workshop on
Hot Topics in Networks (HotNets-III). Citeseer.
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou,
L., Zhang, L., and Barham, P. (2005). Vigilante:
End-to-end containment of internet worms. In ACM
SIGOPS Operating Systems Review, pages 133–147.
ACM.
Crandall, J. R. and Chong, F. T. (2004). Minos: Control
data attack prevention orthogonal to memory model.
In Microarchitecture, 2004. MICRO-37 2004. 37th In-
ternational Symposium on, pages 221–232. IEEE.
Cui, W., Paxson, V., Weaver, N., and Katz, R. H. (2006).
Protocol-independent adaptive replay of application
dialog. In NDSS.
Faulhaber, J., Lambert, J., Probert, D., Srinivasan, H., Fel-
stead, D., Lauricella, M., Rains, T., and Stewart, H.
(2011). Microsoft security intelligence report. Techni-
cal Report 11, Microsoft Corporation, Redmond, WA
98052-6399.
Kohlrausch, J. (2009). Experiences with the noah hon-
eynet testbed to detect new internet worms. In IT Se-
curity Incident Management and IT Forensics, 2009.
IMF’09. Fifth International Conference on, pages 13–
26. IEEE.
Kontaxis, G., Polakis, I., Antonatos, S., and Markatos,
E. P. (2010). Experiences and observations from the
noah infrastructure. In Computer Network Defense
(EC2ND), 2010 European Conference on, pages 11–
18. IEEE.
Kreibich, C. and Crowcroft, J. (2004). Honeycomb: cre-
ating intrusion detection signatures using honeypots.
ACM SIGCOMM Computer Communication Review,
34(1):51–56.
Newsome, J. and Song, D. (2005). Dynamic taint analysis
for automatic detection, analysis, and signature gener-
ation of exploits on commodity software. In Network
and Distributed System Security Symposium (NDSS
2005).
Portokalidis, G., Slowinska, A., and Bos, H. (2006). Argos:
an emulator for fingerprinting zero-day attacks for ad-
vertised honeypots with automatic signature genera-
tion. In ACM SIGOPS Operating Systems Review,
pages 15–27. ACM.
Provos, N. (2003). Honeyd-a virtual honeypot daemon. In
10th DFN-CERT Workshop, Hamburg, Germany, vol-
ume 2.
Provos, N. and Holz, T. (2009). Virtual honeypots: from
botnet tracking to intrusion detection. Addison-
Wesley Professional, third edition.
Suh, G. E., Lee, J. W., Zhang, D., and Devadas, S. (2004).
Secure program execution via dynamic information
flow tracking. In ACM SIGPLAN Notices, pages 85–
96. ACM.
Sullivan, B. (2004). Sasser infections begin to subside.
NBC News. http://www.nbcnews.com/id/4890780/ns/
technology and science-security/t/sasser-infections-
begin-subside/#.UhANu3byrUI.
Venkataramani, G., Doudalis, I., Solihin, Y., and Prvulovic,
M. (2008). Flexitaint: A programmable accelerator
for dynamic taint propagation. In High Performance
Computer Architecture, 2008. HPCA 2008. IEEE 14th
International Symposium on, pages 173–184. IEEE.
Willems, C., Holz, T., and Freiling, F. (2007). Toward au-
tomated dynamic malware analysis using cwsandbox.
Security & Privacy, IEEE, 5(2):32–39.
SECRYPT2015-InternationalConferenceonSecurityandCryptography
376