Pushdown model checking for malware detection

被引:26
|
作者
Song, Fu [1 ]
Touili, Tayssir [2 ,3 ]
机构
[1] E China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] CNRS, Liafa, F-75205 Paris 13, France
[3] Univ Paris Diderot, F-75205 Paris 13, France
基金
中国国家自然科学基金;
关键词
Pushdown Systems; Model Checking; CTL; Malware Detection;
D O I
10.1007/s10009-013-0290-1
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The number of malware is growing extraordinarily fast. Therefore, it is important to have efficient malware detectors. Malware writers try to obfuscate their code by different techniques. Many well-known obfuscation techniques rely on operations on the stack such as inserting dead code by adding useless push and pop instructions, or hiding calls to the operating system, etc. Thus, it is important for malware detectors to be able to deal with the program's stack. In this study, we propose a new model-checking approach for malware detection that takes into account the behavior of the stack. Our approach consists in: (1) Modeling the program using a pushdown system (PDS). (2) Introducing a new logic, called stack computation tree predicate logic (SCTPL), to represent the malicious behavior. SCTPL can be seen as an extension of the branching-time temporal logic CTL with variables, quantifiers, and predicates over the stack. (3) Reducing the malware detection problem to the model-checking problem of PDSs against SCTPL formulas. We show how our new logic can be used to precisely express malicious behaviors that could not be specified by existing specification formalisms. We then consider the model checking problem of PDSs against SCTPL specifications. We reduce this problem to emptiness checking in Symbolic Alternating Buchi Pushdown Systems, and we provide an algorithm to solve this problem. We implemented our techniques in a tool and applied it to detect several viruses. Our results are encouraging.
引用
收藏
页码:147 / 173
页数:27
相关论文
共 50 条
  • [41] Efficient Detection of Vacuity in Temporal Model Checking
    Ilan Beer
    Shoham Ben-David
    Cindy Eisner
    Yoav Rodeh
    Formal Methods in System Design, 2001, 18 : 141 - 163
  • [42] Intrusion detection system evaluation model based on model checking
    Xu, Pengtao
    Zhu, Weijun
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 723 - 727
  • [43] A Survey on Metamorphic Malware Detection based on Hidden Markov Model
    Sasidharan, Satheesh Kumar
    Thomas, Ciza
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 357 - 362
  • [44] Malware Detection Using RGB Images and CNN Model Subclassing
    Ouahab, Ikram Ben Abdel
    Alluhaidan, Yasser
    Elaachak, Lotfi
    Bouhorma, Mohammed
    ADVANCES IN CYBERSECURITY, CYBERCRIMES, AND SMART EMERGING TECHNOLOGIES, 2023, 4 : 3 - 13
  • [45] Detection of Adversarial PE File Malware via Model Interpretation
    Tian Z.-C.
    Zhang W.-Z.
    Qiao Y.-C.
    Liu Y.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1926 - 1943
  • [46] Enhancing PDF Malware Detection through Logistic Model Trees
    Binsawad, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 3645 - 3663
  • [47] Policy conflict detection method based on model checking
    Wu, D., 1600, Univ. of Electronic Science and Technology of China (42): : 745 - 748+768
  • [48] Proactive Detection of Computer Worms Using Model Checking
    Kinder, Johannes
    Katzenbeisser, Stefan
    Schallhart, Christian
    Veith, Helmut
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (04) : 424 - 438
  • [49] Vulnerable Smart Contract Detection by means of Model Checking
    Crincoli, Giuseppe
    Iadarola, Giacomo
    La Rocca, Piera Elena
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    BSCI'22: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE, 2022, : 3 - 10
  • [50] On the complexity of checking semantic equivalences between pushdown processes and finite-state processes
    Kucera, Antonin
    Mayr, Richard
    INFORMATION AND COMPUTATION, 2010, 208 (07) : 772 - 796