Projects projects projects

DETECTING RUNTIME ATTACKS

2025-06-12 11:44:44

This project, titled “Runtime Software Attacks,” was a semester-long project focused on detecting buffer overflow attacks, such as Return-Oriented Programming (ROP). These attacks are particularly challenging because they manipulate a program’s execution without modifying the binary code itself. The central research question was: “How can we implement and detect runtime attacks that manipulate execution flow without altering the source code of the binary iteself?”.

Image shows the dashboard for the systemcall detection monitoring system.

Key Project Components

Image shows the differnt CFG’sproduced from normal usage, shellcode injection and ROP

Everything connected

Architecture of the whole system.

Results & Conclusions

The project concluded that both detection methods could successfully identify runtime attacks. The system call anomaly-based method was noted for its flexibility, while the deterministic CFG-based approach provided a stronger, more certain level of enforcement. The study highlights the critical role of real-time monitoring in modern cybersecurity defenses. Future work could explore the use of machine learning to enhance anomaly detection and the integration of context-specific configurations and honeypots to improve threat detection.

Demonstration

Source code

The source code is available at github.com https://github.com/bummie/aaugrader