Abstract | ||
---|---|---|
The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors seem to share some source code and malware samples often feature similar behaviors, but such commonalities are difficult to detect with signature-based methods because of an increasing use of numerous freelyavailable randomized obfuscation tools. To address this problem, the security community is actively researching behavioral detection methods that commonly attempt to understand and differentiate how malware behaves, as opposed to just detecting syntactic patterns. We continue that line of research in this paper and explore how formal methods and tools of the verification trade could be used for malware detection and analysis. We propose a new approach to learning and generalizing from observed malware behaviors based on tree automata inference. In particular, we develop an algorithm for inferring k-testable tree automata from system call dataflow dependency graphs and discuss the use of inferred automata in malware recognition and classification. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1007/978-3-642-22110-1_10 | CAV |
Keywords | Field | DocType |
tree automata inference,behavioral detection method,malware detection,malware recognition,malware analysis,classical ad-hoc signature detection,observed malware,k-testable tree automaton,malware author,increasing use,malware sample | Cryptovirology,Inference,Computer science,Algorithm,Theoretical computer science,Formal methods,Tree automaton,Obfuscation,Malware,Intrusion detection system,Malware analysis | Conference |
Citations | PageRank | References |
23 | 0.87 | 23 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Domagoj Babić | 1 | 145 | 7.11 |
Daniel Reynaud | 2 | 69 | 3.06 |
Dawn Song | 3 | 7084 | 442.36 |