Obfuscated malicious executable scanner

被引:0
|
作者
Xu, Jianyun
Sung, Andrew H.
Mukkamala, Srinivas
Liu, Oingzhong
机构
[1] Microsoft Corp, Redmond, WA 98052 USA
[2] New Mexico Inst Min & Technol, Dept Comp Sci, Socorro, NM 87801 USA
[3] New Mexico Inst Min & Technol, Inst Complex Addit Syst Anal, Socorro, NM 87801 USA
关键词
polymorphic malware detection; API sequence; sequence realignment; similarity measure;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presented a serious threat to individual users, enterprises, and organizations alike. Current static scanning techniques for malware detection have serious limitations; on the other hand, sandbox testing fails to provide a complete satisfactory solution either due to time constraints (e.g., time bombs cannot be detected before its preset time expires). What is making the situation worse is the ease of producing polymorphic (or variants of) computer viruses that are even more complex and difficult than their original versions to detect. In this paper, we propose a new approach for detecting polymorphic malware in the Windows platform. Our approach rests on an analysis based on the Windows API calling sequence that reflects the behaviour of a particular piece of code. The analysis is carried out directly on the PE (pot-table executable) code. It is achieved in two basic steps: construct the API calling sequences for both the known virus and the suspicious code, and then perform a similarity measurement between the two sequences after a sequence realignment operation is done. An alternative technique based on comparing the bags of API calls, and the technique's performance, are also studied. Favourable (in terms of time and accuracy of detection) experimental results are obtained and presented.
引用
收藏
页码:181 / 197
页数:17
相关论文
共 50 条
  • [11] METHOD FOR DETECTING THE OBFUSCATED MALICIOUS CODE BASED ON BEHAVIOR CONNECTION
    Li, Wenwu
    Li, Chao
    Duan, Miyi
    [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 234 - 240
  • [12] Researches on deobfuscation against malicious code obfuscated with conditional jumps
    Dai, C.
    Pang, J. M.
    Zhao, R. C.
    Fu, W.
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 1093 - 1099
  • [13] JAST: Fully Syntactic Detection of Malicious (Obfuscated) Java']JavaScript
    Fass, Aurore
    Krawczyk, Robert P.
    Backes, Michael
    Stock, Ben
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 303 - 325
  • [14] Detection of Malicious Executable Files Based on Clustering of Activities
    Ognev, R. A.
    Zhukovskii, E., V
    Zegzhda, D. P.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 1092 - 1098
  • [15] Portable executable Scoring: What is your Malicious score?
    Kumar, Ajit
    Aghila, G.
    [J]. 2014 INTERNATIONAL CONFERENCE ON SCIENCE ENGINEERING AND MANAGEMENT RESEARCH (ICSEMR), 2014,
  • [16] Detection of Malicious Executable Files Based on Clustering of Activities
    R. A. Ognev
    E. V. Zhukovskii
    D. P. Zegzhda
    [J]. Automatic Control and Computer Sciences, 2021, 55 : 1092 - 1098
  • [17] Static analysis of the disassembly against malicious code obfuscated with conditional jumps
    Dai, Chao
    Pang, Jianmin
    Zhao, Rongcai
    Ma, Xiaojun
    [J]. 7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 525 - 530
  • [18] OMRDetector: A Method for Detecting Obfuscated Malicious Requests Based on Deep Learning
    Yang X.-Z.
    Peng G.-J.
    Luo Y.
    Song W.-N.
    Zhang J.
    Cao F.-T.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (10): : 2167 - 2189
  • [19] Detecting a malicious executable without prior knowledge of its patterns
    Cai, DM
    Theiler, J
    Gokhale, M
    [J]. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 1 - 12
  • [20] Detecting Malicious Code in Executable Programs with the Principle of Danger Theory
    Zhang, Junmin
    Liang, Yiwen
    [J]. ICAIE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND EDUCATION, VOLS 1 AND 2, 2009, : 495 - 500