On the Feasibility of Malware Authorship Attribution

被引:13
作者
Alrabaee, Saed [1 ]
Shirani, Paria [1 ]
Debbabi, Mourad [1 ]
Wang, Lingyu [1 ]
机构
[1] Concordia Univ, Montreal, PQ, Canada
来源
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016 | 2017年 / 10128卷
关键词
BINARY CODE; INFORMATION; PROGRAM; GRAPH;
D O I
10.1007/978-3-319-51966-1_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are many occasions in which the security community is interested to discover the authorship of malware binaries, either for digital forensics analysis of malware corpora or for thwarting live threats of malware invasion. Such a discovery of authorship might be possible due to stylistic features inherent to software codes written by human programmers. Existing studies of authorship attribution of general purpose software mainly focus on source code, which is typically based on the style of programs and environment. However, those features critically depend on the availability of the program source code, which is usually not the case when dealing with malware binaries. Such program binaries often do not retain many semantic or stylistic features due to the compilation process. Therefore, authorship attribution in the domain of malware binaries based on features and styles that will survive the compilation process is challenging. This paper provides the state of the art in this literature. Further, we analyze the features involved in those techniques. By using a case study, we identify features that can survive the compilation process. Finally, we analyze existing works on binary authorship attribution and study their applicability to real malware binaries.
引用
收藏
页码:256 / 272
页数:17
相关论文
共 40 条
  • [1] Aiken Alex., 2005, MOSS SYSTEM DETECTIN
  • [2] BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
    Alrabaee, Saed
    Wang, Lingyu
    Debbabi, Mourad
    [J]. DIGITAL INVESTIGATION, 2016, 18 : S11 - S22
  • [3] SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code
    Alrabaee, Saed
    Shirani, Paria
    Wang, Lingyu
    Debbabi, Mourad
    [J]. DIGITAL INVESTIGATION, 2015, 12 : S61 - S71
  • [4] OBA2: An Onion approach to Binary code Authorship Attribution
    Alrabaee, Saed
    Saleem, Noman
    Preda, Stere
    Wang, Lingyu
    Debbabi, Mourad
    [J]. DIGITAL INVESTIGATION, 2014, 11 : S94 - S103
  • [5] [Anonymous], 2011, IDA PRO FAST LIB IDE
  • [6] [Anonymous], 25 ANN NETW DISTR SY
  • [7] [Anonymous], [No title captured]
  • [8] [Anonymous], 2011, GITHUB BUILD SOFTWAR
  • [9] [Anonymous], [No title captured]
  • [10] [Anonymous], 2016, C REFACTORING TOOLS