A defense framework against malware and vulnerability exploits

被引:0
|
作者
Meng Zhang
Anand Raghunathan
Niraj K. Jha
机构
[1] Princeton University,Department of Electrical Engineering
[2] Purdue University,School of Electrical and Computer Engineering
关键词
Behavioral anomaly detection; Dynamic binary instrumentation; Malware detection; Vulnerability exploit detection;
D O I
暂无
中图分类号
学科分类号
摘要
Current anti-malware tools have proved to be insufficient in combating ever-evolving malware attacks and vulnerability exploits due to inevitable vulnerabilities present in the complex software used today. In addition, the performance penalty incurred by anti-malware tools is magnified when security approaches designed for desktops are migrated to modern mobile devices, such as tablets and laptops, due to their relatively limited processing capabilities and battery capacities. In this paper, we propose a fine-grained anomaly detection defense framework that offers a cost-efficient way to detect malicious behavior and prevent vulnerability exploits in resource-constrained computing platforms. In this framework, a trusted third party (e.g., the publisher) first tests a new application by running it in a heavily monitored testing environment that emulates the target system and extracts a behavioral model from its execution paths. Extensive security policies are enforced during this process. In case of a violation, the program is denied release to the user. If the application passes the tests, the user can download the behavioral model along with the tested application binary. At run-time, the application is monitored against the behavioral model. In the unlikely event that a new execution path is encountered, conservative but lightweight security policies are applied. To reduce overhead at the user end, the behavioral model may be further reduced by the publisher through static analysis. We have implemented the defense framework using a netbook with the Intel Atom processor and evaluated it with a suite of 51 real-world Linux viruses and malware. Experiments demonstrate that our tool achieves a very high coverage (98 %) of considered malware and security threats. The four antivirus tools we compare our tool against were found to have poor virus coverage, especially of obfuscated viruses. By removing safe standard library blocks from the behavioral model, we reduce the model size by 8.4×\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\times $$\end{document} and the user’s run-time overhead by 23 %.
引用
收藏
页码:439 / 452
页数:13
相关论文
共 50 条
  • [21] Defense against adversarial malware using robust classifier: DAM-ROC
    Selvaganapathy, Shymala Gowri
    Sadasivam, Sudha
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2022, 47 (04):
  • [22] Defense against adversarial malware using robust classifier: DAM-ROC
    Shymala Gowri Selvaganapathy
    Sudha Sadasivam
    [J]. Sādhanā, 47
  • [23] TestREx: a framework for repeatable exploits
    Dashevskyi, Stanislav
    dos Santos, Daniel Ricardo
    Massacci, Fabio
    Sabetta, Antonino
    [J]. INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2019, 21 (01) : 105 - 119
  • [24] The New Progress in the Research of Binary Vulnerability Exploits
    Tan, Tiantian
    Wang, Baosheng
    Xu, Zhou
    Tang, Yong
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 277 - 286
  • [25] An inhibitor of oxidative phosphorylation exploits cancer vulnerability
    Molina, Jennifer R.
    Sun, Yuting
    Protopopova, Marina
    Gera, Sonal
    Bandi, Madhavi
    Bristow, Christopher
    McAfoos, Timothy
    Morlacchi, Pietro
    Ackroyd, Jeffrey
    Agip, Ahmed-Noor A.
    Al-Atrash, Gheath
    Asara, John
    Bardenhagen, Jennifer
    Carrillo, Caroline C.
    Carroll, Christopher
    Chang, Edward
    Ciurea, Stefan
    Cross, Jason B.
    Czako, Barbara
    Deem, Angela
    Daver, Naval
    de Groot, John Frederick
    Dong, Jian-Wen
    Feng, Ningping
    Gao, Guang
    Gay, Jason
    Do, Mary Geck
    Greer, Jennifer
    Giuliani, Virginia
    Han, Jing
    Han, Lina
    Henry, Verlene K.
    Hirst, Judy
    Huang, Sha
    Jiang, Yongying
    Kang, Zhijun
    Khor, Tin
    Konoplev, Sergej
    Lin, Yu-Hsi
    Liu, Gang
    Lodi, Alessia
    Lofton, Timothy
    Ma, Helen
    Mahendra, Mikhila
    Matre, Polina
    Mullinax, Robert
    Peoples, Michael
    Petrocchi, Alessia
    Rodriguez-Canale, Jaime
    Serreli, Riccardo
    [J]. NATURE MEDICINE, 2018, 24 (07) : 1036 - +
  • [26] Predicting Cyber Vulnerability Exploits with Machine Learning
    Edkrantz, Michel
    Said, Alan
    [J]. THIRTEENTH SCANDINAVIAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (SCAI 2015), 2015, 278 : 48 - 57
  • [27] Malware Evasion Attack and Defense
    Huang, Yonghong
    Verma, Utkarsh
    Fralick, Celeste
    Infante-Lopez, Gabriel
    Kumar, Brajesh
    Woodward, Carl
    [J]. 2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2019, : 34 - 38
  • [28] CTO Roundtable: Malware Defense
    Creeger, Mache
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 43 - 49
  • [29] An inhibitor of oxidative phosphorylation exploits cancer vulnerability
    Jennifer R. Molina
    Yuting Sun
    Marina Protopopova
    Sonal Gera
    Madhavi Bandi
    Christopher Bristow
    Timothy McAfoos
    Pietro Morlacchi
    Jeffrey Ackroyd
    Ahmed-Noor A. Agip
    Gheath Al-Atrash
    John Asara
    Jennifer Bardenhagen
    Caroline C. Carrillo
    Christopher Carroll
    Edward Chang
    Stefan Ciurea
    Jason B. Cross
    Barbara Czako
    Angela Deem
    Naval Daver
    John Frederick de Groot
    Jian-Wen Dong
    Ningping Feng
    Guang Gao
    Jason Gay
    Mary Geck Do
    Jennifer Greer
    Virginia Giuliani
    Jing Han
    Lina Han
    Verlene K. Henry
    Judy Hirst
    Sha Huang
    Yongying Jiang
    Zhijun Kang
    Tin Khor
    Sergej Konoplev
    Yu-Hsi Lin
    Gang Liu
    Alessia Lodi
    Timothy Lofton
    Helen Ma
    Mikhila Mahendra
    Polina Matre
    Robert Mullinax
    Michael Peoples
    Alessia Petrocchi
    Jaime Rodriguez-Canale
    Riccardo Serreli
    [J]. Nature Medicine, 2018, 24 : 1036 - 1046
  • [30] TestREx: a framework for repeatable exploits
    Stanislav Dashevskyi
    Daniel Ricardo dos Santos
    Fabio Massacci
    Antonino Sabetta
    [J]. International Journal on Software Tools for Technology Transfer, 2019, 21 : 105 - 119