Malware pattern scanning schemes secure against black-box analysis

被引:0
|
作者
Filiol, Eric [1 ]
机构
[1] Ecole Super & Applicat Transmiss, Lab Virol & Cryptol, BP 18, F-35998 Rennes Armees, France
关键词
D O I
10.1007/s11416-006-0009-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a general rule, copycats produce most of malware variants from an original malware strain. For this purpose, they widely perform black-box analyses of commercial scanners aiming at extracting malware detection patterns. In this paper, we first study the malware detection pattern extraction problem from a complexity point of view and provide the results of a wide-scale study of commercial scanners' black-box analysis. These results clearly show that most of the tested commercial products fail to thwart black-box analysis. Such weaknesses therefore urge copycats to produce even more malware variants. Then, we present a new model of malware detection pattern based on Boolean functions and identify some properties that a reliable detection pattern should have. Lastly, we describe a combinatorial, probabilisticmalware pattern scanning scheme that, on the one hand, highly limits black-box analysis and on the other hand can only be bypassed in the case where there is collusion between a number of copycats. This scheme can incidentally provide some useful technical information to malware crime investigators, thus allowing a faster identification of copycats.
引用
收藏
页码:35 / 50
页数:16
相关论文
共 50 条
  • [31] Practical Black-Box Attacks against Machine Learning
    Papernot, Nicolas
    McDaniel, Patrick
    Goodfellow, Ian
    Jha, Somesh
    Celik, Z. Berkay
    Swami, Ananthram
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 506 - 519
  • [32] Impossibility of Black-Box Simulation Against Leakage Attacks
    Ostrovsky, Rafail
    Persiano, Giuseppe
    Visconti, Ivan
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 130 - 149
  • [33] Boundary Defense Against Black-box Adversarial Attacks
    Aithal, Manjushree B.
    Li, Xiaohua
    2022 26TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2022, : 2349 - 2356
  • [34] Black-Box Attacks against Signed Graph Analysis via Balance Poisoning
    Zhou, Jialong
    Lai, Yuni
    Ren, Jian
    Zhou, Kai
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 530 - 535
  • [35] An Efficient Black-Box Vulnerability Scanning Method for Web Application
    Jin, Haoxia
    Xu, Ming
    Yang, Xue
    Wu, Ting
    Zheng, Ning
    Yang, Tao
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, COLLABORATECOM 2017, 2018, 252 : 444 - 455
  • [36] Black box analysis of android malware detectors
    Nellaivadivelu, Guruswamy
    Di Troia, Fabio
    Stamp, Mark
    ARRAY, 2020, 6 (06)
  • [37] Toward an Effective Black-Box Adversarial Attack on Functional Java']JavaScript Malware against Commercial Anti-Virus
    Tsai, Yun-Da
    Chen, ChengKuan
    Lin, Shou-De
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, CIKM 2021, 2021, : 4165 - 4172
  • [38] Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers
    Rosenberg, Ishai
    Shabtai, Asaf
    Rokach, Lior
    Elovici, Yuval
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 490 - 510
  • [39] Black-Box Circular-Secure Encryption beyond Affine Functions
    Brakerski, Zvika
    Goldwasser, Shafi
    Kalai, Yael Tauman
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 201 - +
  • [40] On Sigma-Protocols and (Packed) Black-Box Secret Sharing Schemes
    Bartoli, Claudia
    Cascudo, Ignacio
    PUBLIC-KEY CRYPTOGRAPHY, PT II, PKC 2024, 2024, 14602 : 426 - 457