Poster: Flexible Function Estimation of IoT Malware Using Graph Embedding Technique

被引:0
作者
Oshio, Kei [1 ]
Takada, Satoshi [1 ]
Han, Chansu [2 ]
Tanaka, Akira [2 ]
Takeuchi, Jun'ichi [1 ]
机构
[1] Kyushu Univ, Fukuoka, Japan
[2] Natl Inst Informat & Commun Technol, Tokyo, Japan
来源
2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022) | 2022年
关键词
IoT malware; malware analysis; signature matching; graph embedding;
D O I
10.1109/ISCC55528.2022.9912475
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most IoT malware is variants generated by editing and reusing parts of the functions based on publicly available source codes. In our previous study, we proposed a method to estimate the functions of a specimen using the Function Call Sequence Graph (FCSG), which is a directed graph of execution sequence of function calls. In the FCSG-based method, the subgraph corresponding to a malware functionality is manually created and called a signature-FSCG. The specimens with the signature-FSCG are expected to have the corresponding functionality. However, this method cannot detect the specimens with a slightly different subgraph from the signature-FSCG. This paper found that these specimens were supposed to have the same functionality for a signature-FSCG. These specimens need more flexible signature matching, and we propose a graph embedding technique to realize it.
引用
收藏
页数:3
相关论文
共 8 条
[1]  
Ding F., 2020, P 15 ACM ASIA C COMP
[2]  
He T., 2021, 2021 6 INT C FOG MOB
[3]   A Fast Algorithm for Constructing Phylogenetic Trees with Application to IoT Malware Clustering [J].
He, Tianxiang ;
Han, Chansu ;
Isawa, Ryoichi ;
Takahashi, Takeshi ;
Kijima, Shuji ;
Takeuchi, Jun'ichi ;
Nakao, Koji .
NEURAL INFORMATION PROCESSING (ICONIP 2019), PT I, 2019, 11953 :766-778
[4]  
Kawasoe R., 2020, P 36 ACMSIGAPP S APP
[5]  
Narayanan A, 2017, Arxiv, DOI arXiv:1707.05005
[6]  
Pa Y.M.P., 2015, 9 USENIX WORKSHOP OF
[7]   AVCLASS: A Tool for Massive Malware Labeling [J].
Sebastian, Marcos ;
Rivera, Richard ;
Kotzias, Platon ;
Caballero, Juan .
RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2016, 2016, 9854 :230-253
[8]  
Takahashi T, 2021, 2021 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), P376, DOI [10.1109/PERCOMWORKSHOPS51409.2021.9431125, 10.1109/PerComWorkshops51409.2021.9431125]