Detection of malicious code in user mode

被引:0
作者
Sangeetha, R. [1 ]
机构
[1] Arunai Engineeing Coll, Dept CSE, Thiruvannamalai, India
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2013年
关键词
Malicious code; system call; static analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A particular type of executable malware code is malicious code that harms the computer or networks without the user intervention. Static analysis is used to identify the location of system calls from service request and monitor the executables at runtime, but difficult to determine the obfuscated code because code uses dynamic code generation and obfuscation techniques. This technique hides the win32 API calls at runtime. Malicious code can interact with operating system through Win32 API usage. Malicious executables can hide their win32 API usage during Static analysis. Our proposed approach is used to distinguish the software executables and analyze the virtual address and API names of instructions from system calls are recorded to match with the interrupt address table. The recorded instructions are found in Address table, the services are forwarded to kernel mode. Filter is mainly focus on separating the address belongs to its local id and remote id for validating the dispatch id in system service dispatch table. Through filter using the process creation algorithm to finalize it service request from legitimate user. The overall processing is done by user mode before the injected code entering into the kernel mode.
引用
收藏
页码:146 / 149
页数:4
相关论文
共 12 条
[1]  
Baliga Arati, 2011, IEEE T DEPENDABLE SE, V8
[2]  
Battistoni Roberto, 2004, SPRINGER, V7, P352
[3]  
Kumar Eric Uday, 2008, SPRINGER, V6, P123
[4]  
Li Jinku, 2011, IEEE T INFORM FORENS, V6
[5]  
Li Xianghe, 2006, Wuhan University Journal of Natural Sciences, V11, P1473, DOI 10.1007/BF02831800
[6]  
Ma Weiqin, 2011, J COMPUT SPRINGER, V8, P1
[7]  
Morales Jose Andre, 2008, SPRINGER, V6, P161
[8]  
Rabek Jesse C., 2003, ACM COMPUTING SOC, V3, P273
[9]  
Shabtai Asaf, 2011, ANDROMALY BEHAV MALW
[10]  
Sun Hung-Min, 2011, IEEE T COMPUTERS, V60