Attention-Based API Locating for Malware Techniques

被引:5
作者
Wong, Guo-Wei [1 ]
Huang, Yi-Ting [2 ]
Guo, Ying-Ren [3 ]
Sun, Yeali [4 ]
Chen, Meng Chang [3 ]
机构
[1] Natl Taiwan Univ, Dept Comp Sci & Informat Engn, Taipei 106319, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Elect Engn, Taipei 106335, Taiwan
[3] Acad Sinica, Taipei 115201, Taiwan
[4] Natl Taiwan Univ, Dept Informat Management, Taipei 10617, Taiwan
关键词
Causality tracking; dynamic analysis; malicious behavior discovery; malware analysis; MITRE ATT&CK; MODEL;
D O I
10.1109/TIFS.2023.3330337
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents APILI, an innovative approach to behavior-based malware analysis that utilizes deep learning to locate the API calls corresponding to discovered malware techniques in dynamic execution traces. APILI defines multiple attentions between API calls, resources, and techniques, incorporating MITRE ATT&CK framework, adversary tactics, techniques and procedures, through a neural network. We employ fine-tuned BERT for arguments/resources embedding, SVD for technique representation, and several design enhancements, including layer structure and noise addition, to improve the locating performance. To the best of our knowledge, this is the first attempt to locate low-level API calls that correspond to high-level malicious behaviors (that is, techniques). Our evaluation demonstrates that APILI outperforms other traditional and machine learning techniques in both technique discovery and API locating. These results indicate the promising performance of APILI, thus allowing it to reduce the analysis workload.
引用
收藏
页码:1199 / 1212
页数:14
相关论文
共 52 条
[31]   API-MalDetect: Automated malware detection framework for windows based on API calls and deep learning techniques [J].
Maniriho, Pascal ;
Mahmood, Abdun Naser ;
Chowdhury, Mohammad Jabed Morshed .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 218
[32]   HOLMES: Real-time APT Detection through Correlation of Suspicious Information Flows [J].
Milajerdi, Sadegh M. ;
Gjomemo, Rigel ;
Eshete, Birhanu ;
Sekar, R. ;
Venkatakrishnan, V. N. .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :1137-1152
[33]  
MITRE ATT&CK, ABOUT US
[34]  
Newsome J., 2005, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
[35]   SoK: ATT&CK Techniques and Trends in Windows Malware [J].
Oosthoek, Kris ;
Doerr, Christian .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 :406-425
[36]  
Le Q, 2014, PR MACH LEARN RES, V32, P1188
[37]  
Reed R., 1999, II, Neural Smithing: Supervised Learning in Feedforward Artificial Neural Networks
[38]   Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers [J].
Rosenberg, Ishai ;
Shabtai, Asaf ;
Rokach, Lior ;
Elovici, Yuval .
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 :490-510
[39]   THE PERCEPTRON - A PROBABILISTIC MODEL FOR INFORMATION-STORAGE AND ORGANIZATION IN THE BRAIN [J].
ROSENBLATT, F .
PSYCHOLOGICAL REVIEW, 1958, 65 (06) :386-408
[40]   LEARNING REPRESENTATIONS BY BACK-PROPAGATING ERRORS [J].
RUMELHART, DE ;
HINTON, GE ;
WILLIAMS, RJ .
NATURE, 1986, 323 (6088) :533-536