2013
DOI: 10.1007/978-3-642-40203-6_29
|View full text |Cite
|
Sign up to set email alerts
|

Mining Malware Specifications through Static Reachability Analysis

Abstract: International audienceAbstract. The number of malicious software (malware) is growing out of control. Syntactic signature based detection cannot cope with such growth and manual construction of malware signature databases needs to be replaced by computer learning based approaches. Currently, a single modern signature capturing the semantics of a malicious behavior can be used to replace an arbitrarily large number of old-fashioned syntactical signatures. However teaching computers to learn such behaviors is a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 25 publications
(15 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…However, Beaucamps et al addressed this problem in their work [13] and proposed a method for static analysis of execution traces acquired from control-flow graphs. Macedo and Touili also discuss the issue in their work [14].…”
Section: Discussionmentioning
confidence: 99%
“…However, Beaucamps et al addressed this problem in their work [13] and proposed a method for static analysis of execution traces acquired from control-flow graphs. Macedo and Touili also discuss the issue in their work [14].…”
Section: Discussionmentioning
confidence: 99%
“…On the other hand comparing graphs to find the existing similarities between them, is time and space consuming because some of problems are NP-complete (Elhadi et al, 2012;Skaletsky et al, 2010;Macedo and Touili, 2013).…”
Section: Related Workmentioning
confidence: 98%
“…Model-checking is time consuming and it is not a suitable real-time detector. (Macedo and Touili, 2013) constructed trees statically to find which data flows between functions are only malicious. The trees constructed with system function and parameters that pass to them as nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the components of the sandbox kernel are open source, e.g. Hypervisor, NFS server, and the security will be based on Data-Service Sovereignty principles, in order to enhance trust among beneficiaries of the HUBCAP Platform (exchanging data and services), but also intended to provide protection mechanisms to prevent the infiltration of malware into the collaboration platform by applying known malware detection techniques, for instance (Macedo and Touili, 2013), which will systematically check the collaboration platform FMUs for malicious behaviour. Furthermore, secure isolation (Suciu et al, 2018) and security information and event management (SIEM) can ensure that aggregated data and log records can be automatically analysed giving a clear picture of what is happening on the platform.…”
Section: Securitymentioning
confidence: 99%