Architecture of a morphological malware detector

被引:28
作者
Bonfante, Guillaume [1 ]
Kaczmarek, Matthieu [1 ]
Marion, Jean-Yves [1 ]
机构
[1] Nancy Univ, Loria, INPL, Ecole Natl Super Mines Nancy, BP 239, F-54506 Vandoeuvre Les Nancy, France
来源
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES | 2009年 / 5卷 / 03期
关键词
Engines - Syntactics - Flow graphs - Semantics;
D O I
10.1007/s11416-008-0102-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of malware detectors are based on syntactic signatures that identify known malicious programs. Up to now this architecture has been sufficiently efficient to overcome most of malware attacks. Nevertheless, the complexity of malicious codes still increase. As a result the time required to reverse engineer malicious programs and to forge new signatures is increasingly longer. This study proposes an efficient construction of a morphological malware detector, that is a detector which associates syntactic and semantic analysis. It aims at facilitating the task of malware analysts providing some abstraction on the signature representation which is based on control flow graphs. We build an efficient signature matching engine over tree automata techniques. Moreover we describe a generic graph rewriting engine in order to deal with classic mutations techniques. Finally, we provide a preliminary evaluation of the strategy detection carrying out experiments on a malware collection.
引用
收藏
页码:263 / 270
页数:8
相关论文
共 17 条
[1]   On the possibility of practically obfuscating programs towards a unified perspective of code protection [J].
Beaucamps, Philippe ;
Filiol, Eric .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (01) :3-21
[2]  
BONFANTE G, 2007, CONTROL FLOW GRAPHS
[3]  
Bruschi D., 2006, TECHNICAL REPORT
[4]   Semantics-aware malware detection [J].
Christodorescu, M ;
Jha, S ;
Seshia, SA ;
Song, D ;
Bryant, RE .
2005 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2005, :32-46
[5]  
Christodorescu M., 2004, Software Engineering Notes, V29, P34, DOI 10.1145/1013886.1007518
[6]   Software transformations to improve malware detection [J].
Christodorescu, Mihai ;
Jha, Somesh ;
Kinder, Johannes ;
Katzenbeisser, Stefan ;
Veith, Helmut .
JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (04) :253-265
[7]  
Comon H., 1997, TREE AUTOMATA TECHNI, V10
[8]  
Dalla Preda M., 2007, POPL 07
[9]  
Filiol E., 2006, 15TH EICAR
[10]  
Filiol E., 2005, COMPUTER VIRUSES FRO