Defining Malicious Behavior

被引:4
作者
Dornhackl, Hermann [1 ]
Kadletz, Konstantin [1 ]
Luh, Robert [1 ]
Tavolato, Paul [1 ]
机构
[1] Univ Appl Sci, Inst IT Secur Res, St Polten, Austria
来源
2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES) | 2015年
关键词
malware; behavior pattern; formal grammar; ABSTRACTION;
D O I
10.1109/ARES.2014.43
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we propose the use of formal methods to model malicious code behavior. The paradigm shift in malware detection from conventional, signature-based static methods to evaluating dynamic system behavior is motivated by the rising number and ever-increasing sophistication of malware currently in the wild. Because of advanced polymorphic and metamorphic techniques, a purely signature-based approach is no longer sufficient for accurate malware recognition. Automating the process of behavior analysis necessitates the use of formal methods. The modeling process is built upon two cornerstones: special system call execution traces generated through dynamic analysis of suspicious code and a self-defined taxonomy of (malicious) system activities. The formal model consists of two parts: A definition of malicious behavior in the form of combinations of tasks necessary to achieve a certain malign goal and of rules for translating each task into possible patterns of system calls. Both models are realized through formal grammars. The behavior model uses the tasks as the alphabet and the grammar rules define which patterns of activities can be used to accomplish certain high-level malicious goals. The translation model on the other hand contains an attributed context-free grammar for each task. The alphabet of each grammar consists of Windows system (API) calls; the grammar rules map each task to patterns of these calls. The attributes are used to convey information contained in the parameters of the individual calls.
引用
收藏
页码:273 / 278
页数:6
相关论文
共 17 条
[1]  
[Anonymous], SEC NETW PROT NPSEC
[2]  
[Anonymous], 2006, COMPILERS PRINCIPLES
[3]  
Bayer U, 2009, THESIS TU WIEN
[4]  
Bayer U., 2007, J COMPUTER VIROLOGY, V2
[5]  
Bayer U., 2010, 25 S APPL COMP LAUS
[6]  
Beaucamps P, 2010, LECT NOTES COMPUT SC, V6418, P168, DOI 10.1007/978-3-642-16612-9_14
[7]  
Bischoff K.M., 1993, OX ATTRIBUTE GRAMMAR
[8]  
Christodorescu M., 2007, ESEC FSE 07
[9]  
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[10]   Open problems in computer virology [J].
Filiol, Eric ;
Helenius, Marko ;
Zanero, Stefano .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 1 (3-4) :55-66