A Survey on Automated Dynamic Malware-Analysis Techniques and Tools

被引:442
|
作者
Egele, Manuel [1 ]
Scholte, Theodoor [2 ]
Kirda, Engin [3 ]
Kruegel, Christopher [4 ]
机构
[1] Vienna Univ Technol, A-1040 Vienna, Austria
[2] SAP Res, Sophia Antipolis, France
[3] Inst Eurecom, Sophia Antipolis, France
[4] Univ Calif Santa Barbara, Santa Barbara, CA 93106 USA
基金
美国国家科学基金会;
关键词
Security; Dynamic analysis; malware; INFORMATION;
D O I
10.1145/2089125.2089126
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Anti-virus vendors are confronted with a multitude of potentially malicious samples today. Receiving thousands of new samples every day is not uncommon. The signatures that detect confirmed malicious threats are mainly still created manually, so it is important to discriminate between samples that pose a new unknown threat and those that are mere variants of known malware. This survey article provides an overview of techniques based on dynamic analysis that are used to analyze potentially malicious samples. It also covers analysis programs that employ these techniques to assist human analysts in assessing, in a timely and appropriate manner, whether a given sample deserves closer manual inspection due to its unknown malicious behavior.
引用
收藏
页数:42
相关论文
共 50 条
  • [1] Malware Dynamic Analysis Evasion Techniques: A Survey
    Afianian, Amir
    Niksefat, Salman
    Sadeghiyan, Babak
    Baptiste, David
    [J]. ACM COMPUTING SURVEYS, 2020, 52 (06)
  • [2] Automated techniques and tools for program analysis : Survey
    Ashish, Kulkarni A.
    Aghav, Jagannath
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [3] A Survey of Dynamic Program Analysis Techniques and Tools
    Gosain, Anjana
    Sharma, Ganga
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 113 - 122
  • [4] Tools & Techniques for Malware Analysis and Classification
    Gandotra, Ekta
    Bansal, Divya
    Sofat, Sanjeev
    [J]. INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (03): : 176 - 197
  • [5] A Survey on malware analysis and mitigation techniques
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Vaidehi, V.
    [J]. COMPUTER SCIENCE REVIEW, 2019, 32 : 1 - 23
  • [6] A framework for automated dynamic malware analysis for Linux
    Vurdelja, Igor
    Blazic, Ivan
    Bojic, Dragan
    Draskovic, Drazen
    [J]. 2020 28TH TELECOMMUNICATIONS FORUM (TELFOR), 2020, : 379 - 382
  • [7] Survey of machine learning techniques for malware analysis
    Ucci, Daniele
    Aniello, Leonardo
    Baldoni, Roberto
    [J]. COMPUTERS & SECURITY, 2019, 81 : 123 - 147
  • [8] A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks
    Roseline, S. Abijah
    Geetha, S.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 92
  • [9] Toward automated dynamic malware analysis using CWSandbox
    Willems, Carsten
    Holz, Thorsten
    Freiling, Felix
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (02) : 32 - 39
  • [10] MARS: From traffic containment to network reconfiguration in malware-analysis systems
    Ceron, Joao Marcelo
    Margi, Cintia Borges
    Granville, Lisandro Zambenedetti
    [J]. COMPUTER NETWORKS, 2017, 129 : 261 - 272