Proactive Detection of Computer Worms Using Model Checking

被引:23
|
作者
Kinder, Johannes [1 ]
Katzenbeisser, Stefan [2 ]
Schallhart, Christian [3 ]
Veith, Helmut [4 ]
机构
[1] Tech Univ Darmstadt, Formal Methods Syst Engn Grp, Fachbereich Informat, D-64289 Darmstadt, Germany
[2] Tech Univ Darmstadt, Secur Engn Grp, Fachbereich Informat, D-64289 Darmstadt, Germany
[3] Univ Oxford, Comp Lab, Oxford OX1 3QD, England
[4] Vienna Univ Technol, Fac Informat, Formal Methods Syst Engn Grp, A-1040 Vienna, Austria
关键词
Invasive software; model checking;
D O I
10.1109/TDSC.2008.74
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants mostly differ in their binary representation rather than their functionality, they can be recognized by analyzing the program behavior, even though they are not covered by the signature databases of current antivirus tools. Proactive malware detectors mitigate this risk by detection procedures that use a single signature to detect whole classes of functionally related malware without signature updates. It is evident that the quality of proactive detection procedures depends on their ability to analyze the semantics of the binary. In this paper, we propose the use of model checking-a well-established software verification technique-for proactive malware detection. We describe a tool that extracts an annotated control flow graph from the binary and automatically verifies it against a formal malware specification. To this end, we introduce the new specification language CTPL, which balances the high expressive power needed for malware signatures with efficient model checking algorithms. Our experiments demonstrate that our technique indeed is able to recognize variants of existing malware with a low risk of false positives.
引用
收藏
页码:424 / 438
页数:15
相关论文
共 50 条
  • [1] Detection of unknown computer worms activity based on computer Behavior using data mining
    Moskovitch, Robert
    Gus, Ido
    Pluderman, Shay
    Stopel, Dima
    Glezer, Chanan
    Shahar, Yuval
    Elovici, Yuval
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN SECURITY AND DEFENSE APPLICATIONS, 2007, : 169 - +
  • [2] Detection of unknown computer worms activity based on computer Behavior using data mining
    Moskovitch, Robert
    Gus, Ido
    Pluderman, Shay
    Stopel, Dima
    Feher, Clint
    Glezer, Chanan
    Shahar, Yuval
    Elovici, Yuval
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 202 - 209
  • [3] Improving the detection of unknown computer worms activity using active learning
    Moskovitch, Robert
    Nissim, Nir
    Stopel, Dima
    Feher, Clint
    Englert, Roman
    Elovici, Yuval
    [J]. KI 2007: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4667 : 489 - +
  • [4] Proactive password checking using neural network
    Park, SH
    Kim, W
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 229 - 233
  • [5] An Impulse Dynamic Model for Computer Worms
    Zhang, Chunming
    Zhao, Yun
    Wu, Yingjiang
    [J]. ABSTRACT AND APPLIED ANALYSIS, 2013,
  • [6] Proactive Fault Detection in Computer Networks
    Alekseev, Dmytro
    Sayenko, Vladimir
    [J]. 2014 FIRST INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2014, : 90 - 91
  • [7] Hardware Trojan Detection using ATPG and Model Checking
    Cruz, Jonathan
    Farahmandi, Farimah
    Ahmed, Alif
    Mishra, Prabhat
    [J]. 2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, : 91 - 96
  • [8] Detection of Security Vulnerabilities Using Guided Model Checking
    Tsitovich, Aliaksei
    [J]. LOGIC PROGRAMMING, PROCEEDINGS, 2008, 5366 : 822 - 823
  • [9] Analysis and detection of computer viruses and worms: An annotated bibliography
    Singh, PK
    Lakhotia, A
    [J]. ACM SIGPLAN NOTICES, 2002, 37 (02) : 29 - 35
  • [10] Computer Worms: Architectures, Evasion Strategies, and Detection Mechanisms
    Smith, Craig
    Matrawy, Ashraf
    Chow, Stanley
    Abdelaziz, Bassem
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (01): : 69 - 83