A Self-Relocation based Method for Malware Detection

被引:0
|
作者
Zhang, Yu [1 ]
Xia, Feng [1 ]
机构
[1] Hainan Normal Univ, Coll Informat Sci & Technol, Haikou 571158, Peoples R China
来源
关键词
Malware detection; Self-relocation; Malicious software;
D O I
10.4028/www.scientific.net/AMM.220-223.2688
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Malware (malicious software) is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system. Most malwares propagate themselves throughout the Internet by self-relocation. Self-relocation is a built-in module in most malwares that gets the base address of the code to correctly infect the other programs. Since most legitimate computer programs do not need the self-relocate module, the detection of malware with self-relocation module can be viewed as a promising approach for malware detection. This paper presents a self-relocation based method for both known and previously unknown malwares. The experiments indicate that the proposed approach has better ability to detect known and unknown malwares than other methods.
引用
收藏
页码:2688 / 2693
页数:6
相关论文
共 50 条
  • [1] A Code Self-Relocation Method for Embedded System
    Tang Xinyu
    Zhang Changyou
    Liang Chen
    Aourra, Khaled
    Li YuanZhang
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 688 - 691
  • [2] An FSM-based approach for malicious code detection using the self-relocation gene
    Zhang, Yu
    Li, Tao
    Sun, Jia
    Qin, Renchao
    [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2008, 5226 : 364 - +
  • [4] Design, testing and evaluation of an end-effector for self-relocation
    Han, Feng
    Sun, Kui
    Liu, Yu
    Liu, Hong
    [J]. ROBOTICA, 2016, 34 (12) : 2689 - 2728
  • [5] An Immunity-inspired Relocation Method for Unknown Malware Detection
    Zhang, Yu
    Wu, Lihua
    Luo, Ziqiang
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ELECTRONIC SCIENCE AND AUTOMATION CONTROL, 2015, 20 : 75 - 78
  • [6] An Energy-Balanced and Timely Self-Relocation Algorithm for Grid-Based Mobile WSNs
    Cheng, Chien-Fu
    Huang, Chih-Wei
    [J]. IEEE SENSORS JOURNAL, 2015, 15 (08) : 4184 - 4193
  • [7] Malware Detection Method Based on Visualization
    Xie, Nannan
    Liang, Haoxiang
    Mu, Linyang
    Zhang, Chuanxue
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT VI, 2024, 14492 : 252 - 264
  • [8] Malware Detection Method Based on Subgraph Similarity
    Wang, Jie
    Wang, Chang-Qing
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (11): : 3436 - 3447
  • [9] A Malware Detection Method Based on Hybrid Learning
    Liang, Guang-Hui
    Bai, Liang
    Pang, Jian-Min
    Shan, Zheng
    Yue, Feng
    Zhang, Lei
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (02): : 286 - 291
  • [10] A malware detection method based on family behavior graph
    Ding, Yuxin
    Xia, Xiaoling
    Chen, Sheng
    Li, Ye
    [J]. COMPUTERS & SECURITY, 2018, 73 : 73 - 86