Malware pattern scanning schemes secure against black-box analysis

被引:0
|
作者
Filiol, Eric [1 ]
机构
[1] Ecole Super & Applicat Transmiss, Lab Virol & Cryptol, BP 18, F-35998 Rennes Armees, France
关键词
D O I
10.1007/s11416-006-0009-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a general rule, copycats produce most of malware variants from an original malware strain. For this purpose, they widely perform black-box analyses of commercial scanners aiming at extracting malware detection patterns. In this paper, we first study the malware detection pattern extraction problem from a complexity point of view and provide the results of a wide-scale study of commercial scanners' black-box analysis. These results clearly show that most of the tested commercial products fail to thwart black-box analysis. Such weaknesses therefore urge copycats to produce even more malware variants. Then, we present a new model of malware detection pattern based on Boolean functions and identify some properties that a reliable detection pattern should have. Lastly, we describe a combinatorial, probabilisticmalware pattern scanning scheme that, on the one hand, highly limits black-box analysis and on the other hand can only be bypassed in the case where there is collusion between a number of copycats. This scheme can incidentally provide some useful technical information to malware crime investigators, thus allowing a faster identification of copycats.
引用
收藏
页码:35 / 50
页数:16
相关论文
共 50 条
  • [11] Black-Box Adversarial Attacks Against Deep Learning Based Malware Binaries Detection with GAN
    Yuan, Junkun
    Zhou, Shaofang
    Lin, Lanfen
    Wang, Feng
    Cui, Jia
    ECAI 2020: 24TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, 325 : 2536 - 2542
  • [12] Analyzing and Explaining Black-Box Models for Online Malware Detection
    Manthena, Harikha
    Kimmel, Jeffrey C.
    Abdelsalam, Mahmoud
    Gupta, Maanak
    IEEE ACCESS, 2023, 11 : 25237 - 25252
  • [13] Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks
    Feng, Ryan
    Hooda, Ashish
    Mangaokar, Neal
    Fawaz, Kassem
    Jha, Somesh
    Prakash, Atul
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 786 - 800
  • [14] A New Approach to Black-Box Concurrent Secure Computation
    Garg, Sanjam
    Kiyoshima, Susumu
    Pandey, Omkant
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 566 - 599
  • [15] On Black-Box Reductions between Predicate Encryption Schemes
    Goyal, Vipul
    Kumar, Virendra
    Lokam, Satya
    Mahmoody, Mohammad
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 440 - 457
  • [16] Simple, Black-Box Constructions of Adaptively Secure Protocols
    Choi, Seung Geol
    Dachman-Soled, Dana
    Malkin, Tal
    Wee, Hoeteck
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 387 - +
  • [17] Binary Black-Box Attacks Against Static Malware Detectors with Reinforcement Learning in Discrete Action Spaces
    Ebrahimi, Mohammadreza
    Pacheco, Jason
    Li, Weifeng
    Hu, James Lee
    Chen, Hsinchun
    2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 85 - 91
  • [18] MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors
    Chen, Xiaohui
    Cui, Lei
    Wen, Hui
    Li, Zhi
    Zhu, Hongsong
    Hao, Zhiyu
    Sun, Limin
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 165 - 178
  • [19] Semantics aware adversarial malware examples generation for black-box attacks
    Peng, Xiaowei
    Xian, Hequn
    Lu, Qian
    Lu, Xiuqing
    APPLIED SOFT COMPUTING, 2021, 109
  • [20] Best-Effort Adversarial Approximation of Black-Box Malware Classifiers
    Ali, Abdullah
    Eshete, Birhanu
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT I, 2020, 335 : 318 - 338