CARET Model Checking for Malware Detection

被引:7
|
作者
Huu-Vu Nguyen [1 ,2 ]
Touili, Tayssir [3 ,4 ]
机构
[1] Univ Paris Diderot, Paris, France
[2] LIPN, Paris, France
[3] CNRS, LIPN, Paris, France
[4] Univ Paris 13, Villetaneuse, France
来源
SPIN'17: PROCEEDINGS OF THE 24TH ACM SIGSOFT INTERNATIONAL SPIN SYMPOSIUM ON MODEL CHECKING OF SOFTWARE | 2017年
关键词
Pushdown systems; CARET formulas; model checking; malware detection;
D O I
10.1145/3092282.3092301
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The number of malware is growing significantly fast. Traditional malware detectors based on signature matching or code emulation are easy to get around. To overcome this problem, model-checking emerges as a technique that has been extensively applied for malware detection recently. Pushdown systems were proposed as a natural model for programs, since they allow to keep track of the stack, while extensions of LTL and CTL were considered for malicious behavior specification. However, LTL and CTL like formulas don't allow to express behaviors with matching calls and returns. In this paper, we propose to use CARET for malicious behavior specification. Since CARET formulas for malicious behaviors are huge, we propose to extend CARET with variables, quantifiers and predicates over the stack. Our new logic is called SPCARET. We reduce the malware detection problem to the model checking problem of PDSs against SPCARET formulas, and we propose efficient algorithms to model check SPCARET formulas for PDSs. We implemented our algorithms in a tool for malware detection. We obtained encouraging results.
引用
收藏
页码:152 / 161
页数:10
相关论文
共 50 条
  • [41] A malware detection model based on a negative selection algorithm with penalty factor
    PengTao Zhang
    Wei Wang
    Ying Tan
    Science China Information Sciences, 2010, 53 : 2461 - 2471
  • [42] An Efficient DenseNet-Based Deep Learning Model for Malware Detection
    Hemalatha, Jeyaprakash
    Roseline, S. Abijah
    Geetha, Subbiah
    Kadry, Seifedine
    Damasevicius, Robertas
    ENTROPY, 2021, 23 (03)
  • [43] MaliFuzz: Adversarial Malware Detection Model for Defending Against Fuzzing Attack
    Gao, Xianwei
    Shan, Chun
    Hu, Changzhen
    Journal of Beijing Institute of Technology (English Edition), 2024, 33 (05): : 436 - 449
  • [44] A Hybrid Optimization Model for Efficient Detection and Classification of Malware in the Internet of Things
    Ahmad, Ijaz
    Wan, Zhong
    Ahmad, Ashfaq
    Ullah, Syed Sajid
    MATHEMATICS, 2024, 12 (10)
  • [45] Recurrent Neural Network Model for IoT and Networking Malware Threat Detection
    Wozniak, Marcin
    Silka, Jakub
    Wieczorek, Michal
    Alrashoud, Mubarak
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) : 5583 - 5594
  • [46] Improving Behavioral Design Pattern Detection through Model Checking
    De Lucia, Andrea
    Deufemia, Vincenzo
    Gravino, Carmine
    Risi, Michele
    14TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING (CSMR 2010), 2010, : 176 - 185
  • [47] Distributed Firewall Anomaly Detection Through LTL Model Checking
    Halle, Sylvain
    Ngoupe, Eric Lunaud
    Villemaire, Roger
    Cherkaoui, Omar
    2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 194 - 201
  • [48] Conflict detection in composite web services based on model checking
    Kim, Yeon-Seok
    Shin, Dong-Hoon
    Jeon, Hyun-Bae
    Lee, Kyong-Ho
    Cho, Kee-Seong
    Park, Wonjoo
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2013, 9 (04) : 394 - 430
  • [49] Software Model Checking for Mobile Security - Collusion Detection in K
    Asavoae, Irina Mariuca
    Hoang Nga Nguyen
    Roggenbach, Markus
    MODEL CHECKING SOFTWARE, SPIN 2018, 2018, 10869 : 3 - 25
  • [50] Malicious Collusion Detection in Mobile Environment by means of Model Checking
    Casolare, Rosangela
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2020,