CARET Model Checking for Malware Detection

被引:7
|
作者
Huu-Vu Nguyen [1 ,2 ]
Touili, Tayssir [3 ,4 ]
机构
[1] Univ Paris Diderot, Paris, France
[2] LIPN, Paris, France
[3] CNRS, LIPN, Paris, France
[4] Univ Paris 13, Villetaneuse, France
来源
SPIN'17: PROCEEDINGS OF THE 24TH ACM SIGSOFT INTERNATIONAL SPIN SYMPOSIUM ON MODEL CHECKING OF SOFTWARE | 2017年
关键词
Pushdown systems; CARET formulas; model checking; malware detection;
D O I
10.1145/3092282.3092301
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The number of malware is growing significantly fast. Traditional malware detectors based on signature matching or code emulation are easy to get around. To overcome this problem, model-checking emerges as a technique that has been extensively applied for malware detection recently. Pushdown systems were proposed as a natural model for programs, since they allow to keep track of the stack, while extensions of LTL and CTL were considered for malicious behavior specification. However, LTL and CTL like formulas don't allow to express behaviors with matching calls and returns. In this paper, we propose to use CARET for malicious behavior specification. Since CARET formulas for malicious behaviors are huge, we propose to extend CARET with variables, quantifiers and predicates over the stack. Our new logic is called SPCARET. We reduce the malware detection problem to the model checking problem of PDSs against SPCARET formulas, and we propose efficient algorithms to model check SPCARET formulas for PDSs. We implemented our algorithms in a tool for malware detection. We obtained encouraging results.
引用
收藏
页码:152 / 161
页数:10
相关论文
共 50 条
  • [21] Malware Detection Using Dual Siamese Network Model
    An, Byeongyeol
    Yang, Jeahyuk
    Kim, Seoyeon
    Kim, Taeguen
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 141 (01): : 563 - 584
  • [22] Efficient Detection of Vacuity in Temporal Model Checking
    Ilan Beer
    Shoham Ben-David
    Cindy Eisner
    Yoav Rodeh
    Formal Methods in System Design, 2001, 18 : 141 - 163
  • [23] Intrusion detection system evaluation model based on model checking
    Xu, Pengtao
    Zhu, Weijun
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 723 - 727
  • [24] A Survey on Metamorphic Malware Detection based on Hidden Markov Model
    Sasidharan, Satheesh Kumar
    Thomas, Ciza
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 357 - 362
  • [25] Malware Detection Using RGB Images and CNN Model Subclassing
    Ouahab, Ikram Ben Abdel
    Alluhaidan, Yasser
    Elaachak, Lotfi
    Bouhorma, Mohammed
    ADVANCES IN CYBERSECURITY, CYBERCRIMES, AND SMART EMERGING TECHNOLOGIES, 2023, 4 : 3 - 13
  • [26] Detection of Adversarial PE File Malware via Model Interpretation
    Tian Z.-C.
    Zhang W.-Z.
    Qiao Y.-C.
    Liu Y.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (04): : 1926 - 1943
  • [27] Enhancing PDF Malware Detection through Logistic Model Trees
    Binsawad, Muhammad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 3645 - 3663
  • [28] Policy conflict detection method based on model checking
    Wu, D., 1600, Univ. of Electronic Science and Technology of China (42): : 745 - 748+768
  • [29] Proactive Detection of Computer Worms Using Model Checking
    Kinder, Johannes
    Katzenbeisser, Stefan
    Schallhart, Christian
    Veith, Helmut
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (04) : 424 - 438
  • [30] Vulnerable Smart Contract Detection by means of Model Checking
    Crincoli, Giuseppe
    Iadarola, Giacomo
    La Rocca, Piera Elena
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    BSCI'22: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON BLOCKCHAIN AND SECURE CRITICAL INFRASTRUCTURE, 2022, : 3 - 10