A semantics-based approach to malware detection

被引:39
|
作者
Preda, Mila Dalla [1 ]
Christodorescu, Mihai [2 ]
Jha, Somesh [2 ]
Debray, Saumya [3 ]
机构
[1] Univ Verona, I-37100 Verona, Italy
[2] Univ Wisconsin, Madison, WI 53706 USA
[3] Univ Arizona, Tucson, AZ USA
来源
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS | 2008年 / 30卷 / 05期
基金
美国国家科学基金会;
关键词
security; languages; theory; verification; malware detection; obfuscation; trace semantics; abstract interpretation;
D O I
10.1145/1387673.1387674
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malware detection is a crucial aspect of software security. Current malware detectors work by checking for signatures, which attempt to capture the syntactic characteristics of the machine-level byte sequence of the malware. This reliance on a syntactic approach makes current detectors vulnerable to code obfuscations, increasingly used by malware writers, that alter the syntactic properties of the malware byte sequence without significantly affecting their execution behavior. This paper takes the position that the key to malware identification lies in their semantics. It proposes a semantics-based framework for reasoning about malware detectors and proving properties such as soundness and completeness of these detectors. Our approach uses a trace semantics to characterize the behavior of malware as well as that of the program being checked for infection, and uses abstract interpretation to "hide" irrelevant aspects of these behaviors. As a concrete application of our approach, we show that (1) standard signature matching detection schemes are generally sound but not complete, (2) the semantics-aware malware detector proposed by Christodorescu et al. is complete with respect to a number of common obfuscations used by malware writers and (3) the malware detection scheme proposed by Kinder et al. and based on standard model-checking techniques is sound in general and complete on some, but not all, obfuscations handled by the semantics-aware malware detector.
引用
收藏
页数:54
相关论文
共 50 条
  • [1] A semantics-based approach to Malware detection
    Preda, Mila Dalla
    Christodorescu, Mihai
    Jha, Somesh
    Debray, Saumya
    ACM SIGPLAN NOTICES, 2007, 42 (01) : 377 - 388
  • [2] A Semantics-Based Approach to Malware Detection
    Preda, Mila Dalla
    Christodorescu, Mihai
    Jha, Somesh
    Debray, Saumya
    CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES, 2007, : 377 - 388
  • [3] A New Semantics-Based Android Malware Detection
    Zhang, Xiaohan
    Jin, Zhengping
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1412 - 1416
  • [4] Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware
    Das, Sanjeev
    Liu, Yang
    Zhang, Wei
    Chandramohan, Mahintham
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) : 289 - 302
  • [5] Semantics-Based Program Verifiers for All Languages
    Stefanescu, Andrei
    Park, Daejun
    Yuwen, Shijiao
    Li, Yilong
    Rosu, Grigore
    ACM SIGPLAN NOTICES, 2016, 51 (10) : 74 - 91
  • [6] Semantics-based binary code automated de-obfuscation approach
    Guo J.
    Wang L.
    Tang Z.
    Fang D.
    2016, Huazhong University of Science and Technology (44): : 55 - 59
  • [7] Semantics-Based Static Vulnerability Detection in Solidity Using Abstract Interpretation
    Kushwaha, Maitri
    Mukherjee, Arnab
    Pandey, Aishwarya
    Halder, Raju
    INFORMATION SYSTEMS SECURITY, ICISS 2024, 2025, 15416 : 265 - 285
  • [8] CONSISTENCY AND ORDERABILITY - SEMANTICS-BASED CORRECTNESS CRITERIA FOR DATABASES
    AGRAWAL, D
    ELABBADI, A
    SINGH, AK
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1993, 18 (03): : 460 - 486
  • [9] A Semantics-based Approach to Large-Scale Mobile Social Networking
    Juan Li
    Hui Wang
    Samee Ullah Khan
    Mobile Networks and Applications, 2012, 17 : 192 - 205
  • [10] A Semantics-based Approach to Large-Scale Mobile Social Networking
    Li, Juan
    Wang, Hui
    Khan, Samee Ullah
    MOBILE NETWORKS & APPLICATIONS, 2012, 17 (02): : 192 - 205