Signature generation and detection of malware families

被引:0
|
作者
Sathyanarayan, V. Sai [1 ]
Kohli, Pankaj [1 ]
Bruhadeshwar, Bezawada [1 ]
机构
[1] Int Inst Informat Technol, C STAR, Hyderabad 500032, Andhra Pradesh, India
来源
INFORMATION SECURITY AND PRIVACY | 2008年 / 5107卷
关键词
malware detection; signature generation; static analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware detection and prevention is critical for the protection of computing systems across the Internet. The problem in detecting malware is that they evolve over a period of time and hence, traditional signature-based malware detectors fail to detect obfuscated and previously unseen malware executables. However, as malware evolves, some semantics of the original malware are preserved as these semantics are necessary for the effectiveness of the malware. Using this observation, we present a novel method for detection of malware using the correlation between the semantics of the malware and its API calls. We construct a base signature for an entire malware class rather than for a single specimen of malware. Such a signature is capable of detecting even unknown and advanced variants that belong to that class. We demonstrate our approach on some well known malware classes and show that any advanced variant of the malware class is detected from the base signature.
引用
收藏
页码:336 / 349
页数:14
相关论文
共 50 条
  • [21] F-Sign: Automatic, Function-Based Signature Generation for Malware
    Shabtai, Asaf
    Menahem, Eitan
    Elovici, Yuval
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2011, 41 (04): : 494 - 508
  • [22] NBP-MS: Malware Signature Generation Based on Network Behavior Profiling
    Shi, Zhixin
    Wang, Xiangyu
    Liu, Pengcheng
    2022 26TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2022, : 1865 - 1870
  • [23] Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing
    Lu, Huabiao
    Zhao, Baokang
    Su, Jinshu
    Xie, Peidai
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (03) : 1591 - 1609
  • [24] Opcode Position A ware Metamorphic Malware Detection: Signature vs Histogram Approach
    George, Nithil
    Vinod, P.
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 1011 - 1017
  • [25] Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing
    Huabiao Lu
    Baokang Zhao
    Jinshu Su
    Peidai Xie
    Wireless Personal Communications, 2014, 75 : 1591 - 1609
  • [26] Using feature generation from API calls for malware detection
    Salehi, Zahra
    Sami, Ashkan
    Ghiasi, Mahboobe
    Computer Fraud and Security, 2014, 2014 (09): : 9 - 18
  • [27] Fingerprinting Android malware families
    Nannan Xie
    Xing Wang
    Wei Wang
    Jiqiang Liu
    Frontiers of Computer Science, 2019, 13 : 637 - 646
  • [28] Fingerprinting Android malware families
    Xie, Nannan
    Wang, Xing
    Wang, Wei
    Liu, Jiqiang
    FRONTIERS OF COMPUTER SCIENCE, 2019, 13 (03) : 637 - 646
  • [29] Clustering based opcode graph generation for malware variant detection
    Wai, Fok Kar
    Thing, Vrizlynn L. L.
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [30] Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics
    Fasano, Fausto
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,