2013 IEEE 33rd International Conference on Distributed Computing Systems 2013
DOI: 10.1109/icdcs.2013.69
|View full text |Cite
|
Sign up to set email alerts
|

AUTOVAC: Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization

Abstract: Malware often contains many system-resourcesensitive condition checks to avoid any duplicate infection, make sure to obtain required resources, or try to infect only targeted computers, etc. If we are able to extract the system resource constraints from malware code, and manipulate the environment state as vaccines, we would then be able to immunize a computer from infections. Towards this end, this paper provides the first systematic study and presents a prototype system, AUTOVAC, for automatically extracting… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 21 publications
1
4
0
Order By: Relevance
“…Similar logic has also been found in Zeus [21] and Conficker [43]. For these cases, even though the clean environment, which does not contain the mutex, is the ideal environment for analysis, we can still see that GOLDEN-EYE's extracted information is useful, potentially for malware prevention, as discussed in [48]. Displayed Windows and Installed Library.…”
Section: Case Studiessupporting
confidence: 68%
“…Similar logic has also been found in Zeus [21] and Conficker [43]. For these cases, even though the clean environment, which does not contain the mutex, is the ideal environment for analysis, we can still see that GOLDEN-EYE's extracted information is useful, potentially for malware prevention, as discussed in [48]. Displayed Windows and Installed Library.…”
Section: Case Studiessupporting
confidence: 68%
“…Malware detection is a different task from malware classification, which is the theme of this study, as the goal of the later is to classify malware variants into their corresponding families. In some recent works, machine learning has also been applied to automate the process of malware classification (e.g., [21,40,15,19,38,20,39]). The main differences among these works lie in the types of features used for malware classification.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…Another dynamic method is deploying active anti-evasion countermeasures after figuring out how evasions detect analysis environments. Xu et al [27] introduced taint analysis [28] for dissecting evasions based on system resource conditions such as files, mutexes, registries, windows, processes, libraries, and services. Based on prior knowledge, recent works systematically classified and dismantled various evasive techniques, creating a transparent analysis environment to trigger more malicious behaviors.…”
Section: Related Workmentioning
confidence: 99%