DLLMiner: structural mining for malware detection

被引:31
作者
Narouei, Masoud [1 ]
Ahmadi, Mansour [2 ]
Giacinto, Giorgio [2 ]
Takabi, Hassan [1 ]
Sami, Ashkan [3 ,4 ]
机构
[1] Univ N Texas, Dept Comp Sci & Engn, Denton, TX 76203 USA
[2] Univ Cagliari, Dept Elect & Elect Engn, I-09124 Cagliari, Italy
[3] Shiraz Univ, Sch Elect & Comp Engn, CSE, Shiraz, Iran
[4] Shiraz Univ, Sch Elect & Comp Engn, IT Dept, Shiraz, Iran
关键词
malware analysis; dependency tree; closed frequent tree; evasion;
D O I
10.1002/sec.1255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing anti-malware products usually use signature-based techniques as their main detection engine. Although these methods are very fast, they are unable to provide effective protection against newly discovered malware or mutated variant of old malware. Heuristic approaches are the next generation of detection techniques to mitigate the problem. These approaches aim to improve the detection rate by extracting more behavioral characteristics of malware. Although these approaches cover the disadvantages of signature-based techniques, they usually have a high false positive, and evasion is still possible from these approaches. In this paper, we propose an effective and efficient heuristic technique based on static analysis that not only detect malware with a very high accuracy, but also is robust against common evasion techniques such as junk injection and packing. Our proposed system is able to extract behavioral features from a unique structure in portable executable, which is called dynamic-link library dependency tree, without actually executing the application. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3311 / 3322
页数:12
相关论文
共 47 条
[1]  
Ahmadi M, 2013, COMPUT FRAUD SECUR, P11, DOI 10.1016/S1361-3723(13)70072-1
[2]  
[Anonymous], 2010, P ACM S APPL COMP
[3]  
[Anonymous], 2013, DAT MIN SOFTW JAV
[4]  
[Anonymous], 2011, INT SEC THREAT REP
[5]  
[Anonymous], 2010, P 12 ANN C GEN EV CO, DOI DOI 10.1145/1830483.1830703
[6]  
[Anonymous], 2013, DIS DEB
[7]  
[Anonymous], J COMPUTERS
[8]  
Asai T, 2002, SIAM PROC S, P158
[9]   Malware Variant Detection Using Similarity Search over Sets of Control Flow Graphs [J].
Cesare, Silvio ;
Xiang, Yang .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :181-189
[10]  
Chen H., 2002, P 9 ACM C COMPUTER C, P235, DOI DOI 10.1145/586110.586142