Pushdown model checking for malware detection

被引:26
|
作者
Song, Fu [1 ]
Touili, Tayssir [2 ,3 ]
机构
[1] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] CNRS, Liafa, F-75205 Paris 13, France
[3] Univ Paris Diderot, F-75205 Paris 13, France
基金
中国国家自然科学基金;
关键词
Pushdown Systems; Model Checking; CTL; Malware Detection;
D O I
10.1007/s10009-013-0290-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different techniques. Many well-known obfuscation techniques rely on operations on the stack such as inserting dead code by adding useless push and pop instructions, or hiding calls to the operating system, etc. Thus, it is important for malware detectors to be able to deal with the program's stack. In this study, we propose a new model-checking approach for malware detection that takes into account the behavior of the stack. Our approach consists in: (1) Modeling the program using a pushdown system (PDS). (2) Introducing a new logic, called stack computation tree predicate logic (SCTPL), to represent the malicious behavior. SCTPL can be seen as an extension of the branching-time temporal logic CTL with variables, quantifiers, and predicates over the stack. (3) Reducing the malware detection problem to the model-checking problem of PDSs against SCTPL formulas. We show how our new logic can be used to precisely express malicious behaviors that could not be specified by existing specification formalisms. We then consider the model checking problem of PDSs against SCTPL specifications. We reduce this problem to emptiness checking in Symbolic Alternating Buchi Pushdown Systems, and we provide an algorithm to solve this problem. We implemented our techniques in a tool and applied it to detect several viruses. Our results are encouraging.
引用
收藏
页码:147 / 173
页数:27
相关论文
共 50 条
  • [31] Model Checking for Data Anomaly Detection
    Ciobanu, Madalina G.
    Fasano, Fausto
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 : 1277 - 1286
  • [32] First-Order Model Checking on Nested Pushdown Trees is Complete for Doubly Exponential Alternating Time
    Kartzow, Alexander
    FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATIONAL STRUCTURES, FOSSACS 2012, 2012, 7213 : 376 - 390
  • [33] Checking On-the-Fly Universality and Inclusion Problems of Visibly Pushdown Automata
    Van Tang, Nguyen
    Ohsaki, Hitoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (12) : 2794 - 2801
  • [34] An advanced profile hidden Markov model for malware detection
    Alipour, Alireza Abbas
    Ansari, Ebrahim
    INTELLIGENT DATA ANALYSIS, 2020, 24 (04) : 759 - 778
  • [35] An End-to-End Model for Android Malware Detection
    Liang, Hongliang
    Song, Yan
    Xiao, Da
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 140 - 142
  • [36] A biological model to improve PE malware detection: Review
    Abdulalla, Saman Mirza
    Kiah, Laiha Mat
    Zakaria, Omar
    INTERNATIONAL JOURNAL OF THE PHYSICAL SCIENCES, 2010, 5 (15): : 2236 - 2247
  • [37] Exploiting Model Checking for Mobile Botnet Detection
    Bernardeschi, Cinzia
    Mercaldo, Francesco
    Nardone, Vittoria
    Santone, Antonella
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 : 963 - 972
  • [38] Efficient detection of vacuity in temporal model checking
    Beer, I
    Ben-David, S
    Eisner, C
    FORMAL METHODS IN SYSTEM DESIGN, 2001, 18 (02) : 141 - 163
  • [39] A Lightweight Malware Detection Model Based on Knowledge Distillation
    Miao, Chunyu
    Kou, Liang
    Zhang, Jilin
    Dong, Guozhong
    MATHEMATICS, 2024, 12 (24)
  • [40] Malware Detection Using Dual Siamese Network Model
    An, Byeongyeol
    Yang, Jeahyuk
    Kim, Seoyeon
    Kim, Taeguen
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 563 - 584