Software Analysis in the Semantic Web

被引:0
作者
Taylor, Joshua [1 ]
Hall, Robert T. [1 ]
机构
[1] Assured Informat Secur, Rome, NY USA
来源
CYBER SENSING 2013 | 2013年 / 8757卷
关键词
Linked Data; Malware Analysis; Hypervisor; Introspection; Dynamic Analysis; Software Analysis; Event Correlation; Reasoning; Semantic Web; OWL;
D O I
10.1117/12.2016122
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many approaches in software analysis, particularly dynamic malware analyis, benefit greatly from the use of linked data and other Semantic Web technology. In this paper, we describe AIS, Inc.'s Semantic Extractor (SemEx) component from the Malware Analysis and Attribution through Genetic Information (MAAGI) effort, funded under DARPA's Cyber Genome program. The SemEx generates OWL-based semantic models of high and low level behaviors in malware samples from system call traces generated by AIS's introspective hypervisor, IntroVirt (TM). Within MAAGI, these semantic models were used by modules that cluster malware samples by functionality, and construct "genealogical" malware lineages. Herein, we describe the design, implementation, and use of the SemEx, as well as the C2DB, an OWL ontology used for representing software behavior and cyber-environments.
引用
收藏
页数:8
相关论文
共 12 条
  • [1] Al Haider N., 2012, P RUNTIME VERIFICATI, V7186, P412
  • [2] Belmonte J., 2010, P ONT DRIV SOFTW ENG, P1
  • [3] Burke P., 2012, TECHNICAL REPORT
  • [4] Hall R. T., 2013, P SOC PHOTO-OPT INS, P8757
  • [5] Semantics-Aware Trace Analysis
    Hoffman, Kevin
    Eugster, Patrick
    Jagannathan, Suresh
    [J]. ACM SIGPLAN NOTICES, 2009, 44 (06) : 453 - 464
  • [6] Lakhotia A., 2013, PPREW 13
  • [7] Computational Asset Description for Cyber Experiment Support using OWL
    Nodine, Marian
    Grimshaw, Robert
    Haglich, Peter
    Wilder, Steven
    Lyles, J. Bryan
    [J]. FIFTH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2011), 2011, : 110 - 117
  • [8] Pfeffer A, 2012, PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P39, DOI 10.1109/MALWARE.2012.6461006
  • [9] Semantic web enabled software analysis
    Tappolet, Jonas
    Kiefer, Christoph
    Bernstein, Abraham
    [J]. JOURNAL OF WEB SEMANTICS, 2010, 8 (2-3): : 225 - 240
  • [10] Walenstein A, 2012, PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, P17, DOI 10.1109/MALWARE.2012.6461003