Malware Similarity Identification Using Call Graph Based System Call Subsequence Features

被引:17
|
作者
Blokhin, Kristina [1 ]
Saxe, Josh [1 ]
Mentis, David [1 ]
机构
[1] Invincea Inc, Fairfax, VA 22030 USA
来源
2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013) | 2013年
关键词
D O I
10.1109/ICDCSW.2013.55
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent literature has proposed approaches to detect code-sharing relationships between malware artifacts, which helps to accelerate the malware reverse engineering process. In this paper we propose a novel code-sharing analysis technique that can complement existing methods. Our algorithm partitions malware system call logs into system call subsequences by identifying places in these logs where the set of saved instruction pointers on the program call stack changes significantly. The extracted subsequences thus reflect subsequences of system calls that occur in local regions of the program call graph. Having extracted subsequences, we then use the subsequences as features for computing a malware sample similarity matrix. A unique contribution of our method is that it incorporates sequence information into the features it uses to perform similarity analysis, but unlike previously proposed longest common substring methods it runs in linear time. Similarly, our method incorporates call stack information into its features but is computationally far more tractable than previously proposed call graph isomorphism techniques. Because we extract information from sample behavior logs, we avoid the problem of obfuscated samples resistant to static analysis tools. We have evaluated our method on a corpus of 959 samples and achieve high precision given known malware family labels.
引用
收藏
页码:6 / 10
页数:5
相关论文
共 50 条
  • [1] A similarity metric method of obfuscated malware using function-call graph
    Xu M.
    Wu L.
    Qi S.
    Xu J.
    Zhang H.
    Ren Y.
    Zheng N.
    Journal in Computer Virology, 2013, 9 (01): : 35 - 47
  • [2] Android Malware Detection Based on Structural Features of the Function Call Graph
    Yang, Yang
    Du, Xuehui
    Yang, Zhi
    Liu, Xing
    ELECTRONICS, 2021, 10 (02) : 1 - 18
  • [3] Malware Classification Based on Graph Convolutional Neural Networks and Static Call Graph Features
    Mester, Attila
    Bodo, Zalan
    ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND PRACTICES IN ARTIFICIAL INTELLIGENCE, 2022, 13343 : 528 - 539
  • [4] Malware classification based on call graph clustering
    Kinable, Joris
    Kostakis, Orestis
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 233 - 245
  • [5] Using G Features to Improve the Efficiency of Function Call Graph Based Android Malware Detection
    Liu, Yu
    Zhang, Liqiang
    Huang, Xiangdong
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (04) : 2947 - 2955
  • [6] Using G Features to Improve the Efficiency of Function Call Graph Based Android Malware Detection
    Yu Liu
    Liqiang Zhang
    Xiangdong Huang
    Wireless Personal Communications, 2018, 103 : 2947 - 2955
  • [7] Markhor: malware detection using fuzzy similarity of system call dependency sequences
    Amir Mohammadzade Lajevardi
    Saeed Parsa
    Mohammad Javad Amiri
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 81 - 90
  • [8] Markhor: malware detection using fuzzy similarity of system call dependency sequences
    Lajevardi, Amir Mohammadzade
    Parsa, Saeed
    Amiri, Mohammad Javad
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (02) : 81 - 90
  • [9] A graph-based model for malware detection and classification using system-call groups
    Nikolopoulos S.D.
    Polenakis I.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (1) : 29 - 46
  • [10] Scalable Function Call Graph-based Malware Classification
    Hassen, Mehadi
    Chan, Philip K.
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 239 - 248