Obfuscated malicious executable scanner

被引:0
|
作者
Xu, Jianyun
Sung, Andrew H.
Mukkamala, Srinivas
Liu, Oingzhong
机构
[1] Microsoft Corp, Redmond, WA 98052 USA
[2] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM 87801 USA
[3] New Mexico Inst Min & Technol, Inst Complex Addit Syst Anal, Socorro, NM 87801 USA
关键词
polymorphic malware detection; API sequence; sequence realignment; similarity measure;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presented a serious threat to individual users, enterprises, and organizations alike. Current static scanning techniques for malware detection have serious limitations; on the other hand, sandbox testing fails to provide a complete satisfactory solution either due to time constraints (e.g., time bombs cannot be detected before its preset time expires). What is making the situation worse is the ease of producing polymorphic (or variants of) computer viruses that are even more complex and difficult than their original versions to detect. In this paper, we propose a new approach for detecting polymorphic malware in the Windows platform. Our approach rests on an analysis based on the Windows API calling sequence that reflects the behaviour of a particular piece of code. The analysis is carried out directly on the PE (pot-table executable) code. It is achieved in two basic steps: construct the API calling sequences for both the known virus and the suspicious code, and then perform a similarity measurement between the two sequences after a sequence realignment operation is done. An alternative technique based on comparing the bags of API calls, and the technique's performance, are also studied. Favourable (in terms of time and accuracy of detection) experimental results are obtained and presented.
引用
收藏
页码:181 / 197
页数:17
相关论文
共 50 条
  • [1] Polymorphic malicious executable scanner by API sequence analysis
    [J]. Xu, J.-Y. (dennisxu@cs.nmt.edu), IEEE Systems, Man and Cybernetics; International Fuzzy Systems Association; IEEE Computational Intelligence Society (Institute of Electrical and Electronics Engineers Computer Society):
  • [2] Polymorphic malicious executable scanner by API sequence analysis
    Xu, JY
    Sung, AH
    Chavez, P
    Mukkamala, S
    [J]. HIS'04: Fourth International Conference on Hybrid Intelligent Systems, Proceedings, 2005, : 378 - 383
  • [3] Unknown Malicious Executable Defection
    Lai, Yingxu
    [J]. ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 202 - 207
  • [4] Detection of Obfuscated Malicious Java']JavaScript Code
    Alazab, Ammar
    Khraisat, Ansam
    Alazab, Moutaz
    Singh, Sarabjot
    [J]. FUTURE INTERNET, 2022, 14 (08):
  • [5] A method for detecting obfuscated calls in malicious binaries
    Lakhotia, A
    Kumar, EU
    Venable, M
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2005, 31 (11) : 955 - 968
  • [6] Obfuscated malicious JavaScript detection by causal relations finding
    Al-Taharwa, Ismail Adel
    Mao, Ching-Hao
    Pao, Hsin-Kuo
    Wu, Kuo-Ping
    Faloutsos, Christos
    Lee, Hahn-Ming
    Chen, Shyi-Ming
    Jeng, Albert B.
    [J]. International Conference on Advanced Communication Technology, ICACT, 2011, : 787 - 792
  • [7] Obfuscated Malicious Java']JavaScript Detection by Machine Learning
    Pan, Jinkun
    Mao, Xiaoguang
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 805 - 810
  • [8] Obfuscated malicious code detection with path condition analysis
    Fan, Wenqing
    Lei, Xue
    An, Jing
    [J]. Journal of Networks, 2014, 9 (05) : 1208 - 1214
  • [9] Detecting and De-Obfuscating Obfuscated Malicious JavaScript Code
    [J]. Wang, Wei (wangwei1@bjtu.edu.cn), 1699, Science Press (40):
  • [10] Obfuscated Malicious Java']Javascript Detection using Classification Techniques
    Likarish, Peter
    Jung, Eunjin E. J.
    Jo, Insoon
    [J]. 2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 47 - +