A semantics-based approach to malware detection

被引:39
|
作者
Preda, Mila Dalla [1 ]
Christodorescu, Mihai [2 ]
Jha, Somesh [2 ]
Debray, Saumya [3 ]
机构
[1] Univ Verona, I-37100 Verona, Italy
[2] Univ Wisconsin, Madison, WI 53706 USA
[3] Univ Arizona, Tucson, AZ USA
来源
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS | 2008年 / 30卷 / 05期
基金
美国国家科学基金会;
关键词
security; languages; theory; verification; malware detection; obfuscation; trace semantics; abstract interpretation;
D O I
10.1145/1387673.1387674
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malware detection is a crucial aspect of software security. Current malware detectors work by checking for signatures, which attempt to capture the syntactic characteristics of the machine-level byte sequence of the malware. This reliance on a syntactic approach makes current detectors vulnerable to code obfuscations, increasingly used by malware writers, that alter the syntactic properties of the malware byte sequence without significantly affecting their execution behavior. This paper takes the position that the key to malware identification lies in their semantics. It proposes a semantics-based framework for reasoning about malware detectors and proving properties such as soundness and completeness of these detectors. Our approach uses a trace semantics to characterize the behavior of malware as well as that of the program being checked for infection, and uses abstract interpretation to "hide" irrelevant aspects of these behaviors. As a concrete application of our approach, we show that (1) standard signature matching detection schemes are generally sound but not complete, (2) the semantics-aware malware detector proposed by Christodorescu et al. is complete with respect to a number of common obfuscations used by malware writers and (3) the malware detection scheme proposed by Kinder et al. and based on standard model-checking techniques is sound in general and complete on some, but not all, obfuscations handled by the semantics-aware malware detector.
引用
收藏
页数:54
相关论文
共 50 条
  • [41] An efficient malware detection approach with feature weighting based on Harris Hawks optimization
    Alzubi, Omar A.
    Alzubi, Jafar A.
    Al-Zoubi, Ala' M.
    Hassonah, Mohammad A.
    Kose, Utku
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2369 - 2387
  • [42] A GENERAL FRAMEWORK FOR SEMANTICS-BASED BOTTOM-UP ABSTRACT INTERPRETATION OF LOGIC PROGRAMS
    BARBUTI, R
    GIACOBAZZI, R
    LEVI, G
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (01): : 133 - 181
  • [43] Music classification as a new approach for malware detection
    Mehrdad Farrokhmanesh
    Ali Hamzeh
    Journal of Computer Virology and Hacking Techniques, 2019, 15 : 77 - 96
  • [44] An efficient malware detection approach with feature weighting based on Harris Hawks optimization
    Omar A. Alzubi
    Jafar A. Alzubi
    Ala’ M. Al-Zoubi
    Mohammad A. Hassonah
    Utku Kose
    Cluster Computing, 2022, 25 : 2369 - 2387
  • [45] AdMat: A CNN-on-Matrix Approach to Android Malware Detection and Classification
    Vu, Long Nguyen
    Jung, Souhwan
    IEEE ACCESS, 2021, 9 : 39680 - 39694
  • [46] A Novel Compression-Based Approach for Malware Detection Using PE Header
    Khorsand, Zahra
    Hamzeh, Ali
    2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2013, : 127 - 133
  • [47] A Hybrid Anomaly Detection Approach for Obfuscated Malware
    Fuhnwi, Gerard Shu
    Revelle, Matthew
    Izurieta, Clemente
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 159 - 165
  • [48] Music classification as a new approach for malware detection
    Farrokhmanesh, Mehrdad
    Hamzeh, Ali
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (02) : 77 - 96
  • [49] The Malware Detection Approach in the Design of Mobile Applications
    Aboshady, Doaa
    Ghannam, Naglaa
    Elsayed, Eman
    Diab, Lamiaa
    SYMMETRY-BASEL, 2022, 14 (05):
  • [50] A hybrid approach of mobile malware detection in Android
    Tong, Fei
    Yan, Zheng
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2017, 103 : 22 - 31