Efficient Signature Generation for Classifying Cross-Architecture IoT Malware

被引:0
作者
Alhanahnah, Mohannad [1 ]
Lin, Qicheng [1 ]
Yan, Qiben [1 ]
Zhang, Ning [2 ]
Chen, Zhenxiang [3 ]
机构
[1] Univ Nebraska, Dept Comp Sci & Engn, Lincoln, NE 68588 USA
[2] Virginia Polytech Inst & State Univ, Dept Comp Sci, Blacksburg, VA 24061 USA
[3] Univ Jinan, Dept Comp Sci, Jinan, Shandong, Peoples R China
来源
2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2018年
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet-of-Things (IoT) devices are increasingly targeted by adversaries due to their unique characteristics such as constant online connection, lack of protection, and full integration in people's daily life. As attackers shift their targets towards IoT devices, malware has been developed to compromise IoT devices equipped with different CPU architectures. While malware detection has been a well-studied area for desktop PCs, heterogeneous processor architecture in IoT devices brings in unique challenges. Existing approaches utilize static or dynamic binary analysis for identifying malware characteristics, but they all fall short when dealing with IoT malware compiled for different architectures. In this paper, we propose an efficient signature generation method for IoT malware, which generates distinguishable signatures based on high-level structural, statistical and string feature vectors, as high-level features are more robust against code variations across different architectures. The generated signatures for each malware family can be used for developing lightweight malware detection tools to secure IoT devices. Extensive experiments with two datasets of 5,150 recent IoT malware samples show that our scheme can achieve 95.5% detection rate with 0% false positive rate. Moreover, the proposed scheme can achieve 85.2% detection rate in detecting novel IoT malware.
引用
收藏
页数:9
相关论文
共 25 条
  • [1] Profiling and classifying the behavior of malicious codes
    Alazab, Mamoun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 : 91 - 102
  • [2] [Anonymous], 2013, 2013 USENIX ANN TECH
  • [3] [Anonymous], 1988, Algorithms for Clustering Data
  • [4] Bourquin M., 2013, P 2 ACM SIGPLAN PROG, P1, DOI DOI 10.1145/2430553.2430557
  • [5] BinGo: Cross-Architecture Cross-OS Binary Search
    Chandramohan, Mahinthan
    Xue, Yinxing
    Xu, Zhengzi
    Liu, Yang
    Cho, Chia Yuan
    Kuan, Tan Hee Beng
    [J]. FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2016, : 678 - 689
  • [6] Chen Daming Dominic, 2016, P NDSS, P21
  • [7] Costin A, 2014, USENIX SEC S, P95
  • [8] Costin A., 2017, 32 INT C ICT SYST SE
  • [9] Egele M, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P303
  • [10] Eschweiler S., 2016, P NDSS FEBR, P21