2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS) 2012
DOI: 10.1109/crisis.2012.6378949
|View full text |Cite
|
Sign up to set email alerts
|

Evasion-resistant malware signature based on profiling kernel data structure objects

Abstract: Abstract-Malware authors attempt in an endless effort to find new methods to evade the malware detection engines. A popular method is the use of obfuscation technologies that change the syntax of malicious code while preserving the execution semantics. This leads to the evasion of signatures that are built based on the code syntax. In this paper, we propose a novel approach to develop an evasion-resistant malware signature. This signature is based on the malware's execution profiles extracted from kernel data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…For example, features that can distinguish certain type of traffic from the traffic flows are picked for the network traffic model training. The idea behind the feature selection tools is to reduce the amount of features into a feasible subset of features that do not correlate with each other [5,6]. In this paper proposed graph based technique for malware detection.…”
Section: Introductionmentioning
confidence: 99%
“…For example, features that can distinguish certain type of traffic from the traffic flows are picked for the network traffic model training. The idea behind the feature selection tools is to reduce the amount of features into a feasible subset of features that do not correlate with each other [5,6]. In this paper proposed graph based technique for malware detection.…”
Section: Introductionmentioning
confidence: 99%
“…This is while existing security solutions (e.g. host-based intrusion detection [LZO10] [Hu10], and malware detection [ALVW10][EMO12], [SLGM12]) mostly concentrate on the security threats or vulnerability of application-level programs.…”
Section: Introductionmentioning
confidence: 99%
“…Such information is specific to the analysis environment configuration and may contribute to inaccurate profiles. Thus, kernel object properties of interest -and that are considered in profiling process -are properties that affect program execution in the operating system kernel and, if tampered with, monitored program may produce unpredictable behavior [33,38]. Thus, user or host specific information is defined as a set of properties and are excluded from profiling process.…”
Section: Kernel Object Memory Profiling Formalizationmentioning
confidence: 99%