A defense framework against malware and vulnerability exploits

被引:0
|
作者
Meng Zhang
Anand Raghunathan
Niraj K. Jha
机构
[1] Princeton University,Department of Electrical Engineering
[2] Purdue University,School of Electrical and Computer Engineering
关键词
Behavioral anomaly detection; Dynamic binary instrumentation; Malware detection; Vulnerability exploit detection;
D O I
暂无
中图分类号
学科分类号
摘要
Current anti-malware tools have proved to be insufficient in combating ever-evolving malware attacks and vulnerability exploits due to inevitable vulnerabilities present in the complex software used today. In addition, the performance penalty incurred by anti-malware tools is magnified when security approaches designed for desktops are migrated to modern mobile devices, such as tablets and laptops, due to their relatively limited processing capabilities and battery capacities. In this paper, we propose a fine-grained anomaly detection defense framework that offers a cost-efficient way to detect malicious behavior and prevent vulnerability exploits in resource-constrained computing platforms. In this framework, a trusted third party (e.g., the publisher) first tests a new application by running it in a heavily monitored testing environment that emulates the target system and extracts a behavioral model from its execution paths. Extensive security policies are enforced during this process. In case of a violation, the program is denied release to the user. If the application passes the tests, the user can download the behavioral model along with the tested application binary. At run-time, the application is monitored against the behavioral model. In the unlikely event that a new execution path is encountered, conservative but lightweight security policies are applied. To reduce overhead at the user end, the behavioral model may be further reduced by the publisher through static analysis. We have implemented the defense framework using a netbook with the Intel Atom processor and evaluated it with a suite of 51 real-world Linux viruses and malware. Experiments demonstrate that our tool achieves a very high coverage (98 %) of considered malware and security threats. The four antivirus tools we compare our tool against were found to have poor virus coverage, especially of obfuscated viruses. By removing safe standard library blocks from the behavioral model, we reduce the model size by 8.4×\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\times $$\end{document} and the user’s run-time overhead by 23 %.
引用
收藏
页码:439 / 452
页数:13
相关论文
共 50 条
  • [1] A defense framework against malware and vulnerability exploits
    Zhang, Meng
    Raghunathan, Anand
    Jha, Niraj K.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (05) : 439 - 452
  • [2] Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection
    Sun R.
    Guo S.
    Xing C.
    Duan Y.
    Yang L.
    Guo X.
    Pan Z.
    [J]. PeerJ Computer Science, 2023, 9
  • [3] Instance attack: an explanation-based vulnerability analysis framework against DNNs for malware detection
    Sun, Ruijin
    Guo, Shize
    Xing, Changyou
    Duan, Yexin
    Yang, Luming
    Guo, Xi
    Pan, Zhisong
    [J]. PEERJ COMPUTER SCIENCE, 2023, 9
  • [4] A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    Sun, Yan Lindsay
    Han, Zhu
    Yu, Wei
    Liu, K. J. Ray
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 810 - +
  • [5] Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware
    Yu, Alian
    Kang, Jian
    Morris, Joshua
    Bertino, Elisa
    Lin, Dan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4953 - 4966
  • [6] ELAMD: An ensemble learning framework for adversarial malware defense
    Chen, Jiaqi
    Yuan, Chong
    Li, Jiashuo
    Tian, Donghai
    Ma, Rui
    Jia, Xiaoqi
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [7] Defense against malware propagation in complex heterogeneous networks
    Hosseini, Soodeh
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (02): : 1199 - 1215
  • [8] Defense against malware propagation in complex heterogeneous networks
    Soodeh Hosseini
    [J]. Cluster Computing, 2021, 24 : 1199 - 1215
  • [9] ChaffyScript: Vulnerability-Agnostic Defense of Java']JavaScript Exploits via Memory Perturbation
    Hu, Xunchao
    Testa, Brian
    Yin, Heng
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 191 - 213
  • [10] Dynamic binary instrumentation-based framework for malware defense
    Aaraj, Najwa
    Raghunathan, Anand
    Jha, Niraj K.
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2008, 5137 : 64 - +