Malware pattern scanning schemes secure against black-box analysis

被引:0
|
作者
Filiol, Eric [1 ]
机构
[1] Ecole Super & Applicat Transmiss, Lab Virol & Cryptol, BP 18, F-35998 Rennes Armees, France
关键词
D O I
10.1007/s11416-006-0009-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a general rule, copycats produce most of malware variants from an original malware strain. For this purpose, they widely perform black-box analyses of commercial scanners aiming at extracting malware detection patterns. In this paper, we first study the malware detection pattern extraction problem from a complexity point of view and provide the results of a wide-scale study of commercial scanners' black-box analysis. These results clearly show that most of the tested commercial products fail to thwart black-box analysis. Such weaknesses therefore urge copycats to produce even more malware variants. Then, we present a new model of malware detection pattern based on Boolean functions and identify some properties that a reliable detection pattern should have. Lastly, we describe a combinatorial, probabilisticmalware pattern scanning scheme that, on the one hand, highly limits black-box analysis and on the other hand can only be bypassed in the case where there is collusion between a number of copycats. This scheme can incidentally provide some useful technical information to malware crime investigators, thus allowing a faster identification of copycats.
引用
收藏
页码:35 / 50
页数:16
相关论文
共 50 条
  • [1] Malware Pattern Scanning Schemes Secure Against Black-box Analysis
    Eric Filiol
    Journal in Computer Virology, 2006, 2 (1): : 35 - 50
  • [2] Explaining Black-box Android Malware Detection
    Melis, Marco
    Maiorca, Davide
    Biggio, Battista
    Giacinto, Giorgio
    Roli, Fabio
    2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, : 524 - 528
  • [3] Malware Detection Using Black-Box Neural Method
    Pieczynski, Dominik
    Jedrzejek, Czeslaw
    MULTIMEDIA AND NETWORK INFORMATION SYSTEMS, 2019, 833 : 180 - 189
  • [4] Reinforcement learning based adversarial malware example generation against black-box detectors
    Zhong, Fangtian
    Hu, Pengfei
    Zhang, Guoming
    Li, Hong
    Cheng, Xiuzhen
    COMPUTERS & SECURITY, 2022, 121
  • [5] Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection
    Wang, Fangwei
    Lu, Yuanyuan
    Wang, Changguang
    Li, Qingru
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [6] On the Round Complexity of Black-Box Secure MPC
    Ishai, Yuval
    Khurana, Dakshita
    Sahai, Amit
    Srinivasan, Akshayaram
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 214 - 243
  • [7] BLACK-BOX CONSTRUCTIONS OF PROTOCOLS FOR SECURE COMPUTATION
    Haitner, Iftach
    Ishai, Yuval
    Kushilevitz, Eyal
    Lindell, Yehuda
    Petrank, Erez
    SIAM JOURNAL ON COMPUTING, 2011, 40 (02) : 225 - 266
  • [8] Bounds on the efficiency of "black-box" commitment schemes
    Horvitz, O
    Katz, J
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 128 - 139
  • [9] Bounds on the efficiency of black-box commitment schemes
    Horvitz, Omer
    Katz, Jonathan
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (10) : 1251 - 1260
  • [10] Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers
    Rosenberg, Ishai
    Shabtai, Asaf
    Elovici, Yuval
    Rokach, Lior
    36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 611 - 626