%0 Conference Proceedings %T Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems %+ University College Cork (UCC) %+ IBM [DUBLIN] (IBM) %A Pieczul, Olgierd %A Foley, Simon, N. %Z Part 7: Trust and Zero-Day Vulnerabilities %< avec comité de lecture %( Lecture Notes in Computer Science %B 30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) %C Trento, Italy %Y Silvio Ranise %Y Vipin Swarup %I Springer International Publishing %3 Data and Applications Security and Privacy XXX %V LNCS-9766 %P 347-363 %8 2016-07-18 %D 2016 %R 10.1007/978-3-319-41483-6_24 %Z Computer Science [cs]Conference papers %X It is argued that runtime verification techniques can be used to identify unknown application security vulnerabilities that are a consequence of unexpected execution paths in software. A methodology is proposed that can be used to build a model of expected application execution paths during the software development cycle. This model is used at runtime to detect exploitation of unknown security vulnerabilities using anomaly detection style techniques. The approach is evaluated by considering its effectiveness in identifying 19 vulnerabilities across 26 versions of Apache Struts over a 5 year period. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01633685/document %2 https://inria.hal.science/hal-01633685/file/428203_1_En_24_Chapter.pdf %L hal-01633685 %U https://inria.hal.science/hal-01633685 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-9766