2007
DOI: 10.1007/s11416-007-0074-9
|View full text |Cite
|
Sign up to set email alerts
|

Malware behaviour analysis

Abstract: Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and automated approach to extract malware behaviour by observing all the system function calls performed in a virtualized execution environment. Similarities and distances between malware behaviours are computed which allows to classify malware behaviours. The main features of our approach reside in coupling a sequence alignment method t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 95 publications
(41 citation statements)
references
References 13 publications
0
41
0
Order By: Relevance
“…Any malicious software for execution or replications invokes some kernel level system call to communicate with operating system; it is a sign of malicious activity. In [22,21,25], addressed automatic behavior analysis using Windows API calls, instruction set, control flow graph, function parameter analysis and system calls are used as features.…”
Section: Feature Extraction Methodsmentioning
confidence: 99%
“…Any malicious software for execution or replications invokes some kernel level system call to communicate with operating system; it is a sign of malicious activity. In [22,21,25], addressed automatic behavior analysis using Windows API calls, instruction set, control flow graph, function parameter analysis and system calls are used as features.…”
Section: Feature Extraction Methodsmentioning
confidence: 99%
“…Wagener et al [9] extracted the behavior information of malware by observing that malware invoked the system functions. Then, they compared the malware' API invocation information and calculated similarities among malware variants.…”
Section: Literature Surveymentioning
confidence: 99%
“…A lot of researchers rely on an analytic setting of virtual machines, as described in a work e.g. by Wagener, State, & Dulaunoy (2008). A potentially malicious code is executed and analyzed in a virtual environment without a risk of damaging the host system.…”
Section: Secure Environments For Unknown Code Testingmentioning
confidence: 99%