Analysis of Maximum Executable Length for Detecting Text-based Malware

被引:0
|
作者
Manna, Parbati Kumar [1 ]
Ranka, Sanjay [1 ]
Chen, Shigang [1 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
关键词
D O I
10.1109/ICDCS.2008.70
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The possibility of using purely text stream (keyboard-enterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, from code-injection attacks at the top level to host-compromising text-based machine code at the lowest level. Since a large number of protocols are text-based, at times the servers based on those protocols use ASCII filters to allow text input only. However simply applying ASCII filters to weed out the binary data is not enough from the security viewpoint since the assumption that malware are always binary is false. We show that although text is a subset of binary, binary malware detectors cannot always detect text malware. We analyze the MEL (Maximum Executable Length)-based detection schemes, and make two contributions by this analysis. First, although the concept of MEL has been used in various detection schemes earlier, we are the first to provide its underlying mathematical foundation. We show that the threshold value can be calculated from the input character frequencies and that it can be tuned to control the detection sensitivity Second, we demonstrate the effectiveness of a MEL-based text malware detector by exploiting the specific properties of text streams.
引用
收藏
页码:176 / 183
页数:8
相关论文
共 50 条
  • [1] Text-based Decision Fusion Model for Detecting Depression
    Zhang, Yufeng
    Wang, Yingxue
    Wang, Xueli
    Zou, Bochao
    Xie, Haiyong
    [J]. SSPS 2020: 2020 2ND SYMPOSIUM ON SIGNAL PROCESSING SYSTEMS, 2020, : 101 - 106
  • [2] A Text-Based Analysis of Corporate Innovation
    Bellstam, Gustaf
    Bhagat, Sanjai
    Cookson, J. Anthony
    [J]. MANAGEMENT SCIENCE, 2021, 67 (07) : 4004 - 4031
  • [3] Effects of Text Rotation, String Length, and Letter Format on Text-based CAPTCHA Robustness
    Tangmanee, Chatpong
    [J]. JOURNAL OF APPLIED SECURITY RESEARCH, 2016, 11 (03) : 349 - 361
  • [4] A comparison of text-based methods for detecting duplication in scanned document databases
    Lopresti, DP
    [J]. INFORMATION RETRIEVAL, 2001, 4 (02): : 153 - 173
  • [5] A Comparison of Text-Based Methods for Detecting Duplication in Scanned Document Databases
    Daniel P. Lopresti
    [J]. Information Retrieval, 2001, 4 : 153 - 173
  • [6] A comparison of text-based methods for detecting duplication in document image databases
    Lopresti, DP
    [J]. DOCUMENT RECOGNITION AND RETRIEVAL VII, 2000, 3967 : 210 - 221
  • [7] A hybrid method for text-based sentiment analysis
    Thanh Le
    [J]. 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 1392 - 1397
  • [8] Latent semantic analysis for text-based research
    Foltz, PW
    [J]. BEHAVIOR RESEARCH METHODS INSTRUMENTS & COMPUTERS, 1996, 28 (02): : 197 - 202
  • [9] Redefining Financial Constraints: A Text-Based Analysis
    Hoberg, Gerard
    Maksimovic, Vojislav
    [J]. REVIEW OF FINANCIAL STUDIES, 2015, 28 (05): : 1312 - 1352
  • [10] Text-based informatics
    Valdes-Perez, RE
    [J]. SCIENTIST, 1998, 12 (14): : 10 - 10