Hunting for undetectable metamorphic viruses

被引:72
作者
Lin, Da [1 ]
Stamp, Mark [2 ]
机构
[1] Cisco Syst Inc, San Jose, CA USA
[2] San Jose State Univ, Dept Comp Sci, San Jose, CA 95192 USA
来源
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES | 2011年 / 7卷 / 03期
关键词
D O I
10.1007/s11416-010-0148-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Commercial anti-virus scanners are generally signature based, that is, they scan for known patterns to determine whether a file is infected. To evade signature-based detection, virus writers have employed code obfuscation techniques to create metamorphic viruses. Metamorphic viruses change their internal structure from generation to generation, which can provide an effective defense against signature-based detection. To combat metamorphic viruses, detection tools based on statistical analysis have been studied. A tool that employs hidden Markov models (HMMs) was previously developed and the results are encouraging-it has been shown that metamorphic viruses created by a reasonably strong metamorphic engine can be detected using an HMM. In this paper, we explore whether there are any exploitable weaknesses in anHMM-based detection approach. We create a highly metamorphic virus-generating tool designed specifically to evade HMM-based detection. We then test our engine, showing that we can generate metamorphic copies that cannot be detected using existing HMM-based detection techniques.
引用
收藏
页码:201 / 214
页数:14
相关论文
共 21 条
[1]   Profile hidden Markov models and metamorphic virus detection [J].
Attaluri, Srilatha ;
McGhee, Scott ;
Stamp, Mark .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (02) :151-169
[2]  
Aycock J., 2006, COMPUTER VIRUSES MAL, V22
[3]  
Bailey M, 2007, LECT NOTES COMPUT SC, V4637, P178
[4]  
Caillat B.A., 2010, BINTHAVRO USEFUL FAS
[5]  
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[6]  
Daoud E. A., 2008, INT J OPEN PROBLEMS, V1
[7]  
DURBIN R., 1999, BIOL SEQUENCE ANAL P
[8]  
Filiol E, 2007, J COMPUT VIROL HACKI, V3, P65, DOI 10.1007/s11416-007-0041-5
[9]  
Gheorghescu M., 2005, AUTOMATED VIRUS CLAS
[10]  
Gueguen G., 2010, NEW THREAT GRAMMARS