A semantics-based approach to malware detection

被引:39
|
作者
Preda, Mila Dalla [1 ]
Christodorescu, Mihai [2 ]
Jha, Somesh [2 ]
Debray, Saumya [3 ]
机构
[1] Univ Verona, I-37100 Verona, Italy
[2] Univ Wisconsin, Madison, WI 53706 USA
[3] Univ Arizona, Tucson, AZ USA
基金
美国国家科学基金会;
关键词
security; languages; theory; verification; malware detection; obfuscation; trace semantics; abstract interpretation;
D O I
10.1145/1387673.1387674
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Malware detection is a crucial aspect of software security. Current malware detectors work by checking for signatures, which attempt to capture the syntactic characteristics of the machine-level byte sequence of the malware. This reliance on a syntactic approach makes current detectors vulnerable to code obfuscations, increasingly used by malware writers, that alter the syntactic properties of the malware byte sequence without significantly affecting their execution behavior. This paper takes the position that the key to malware identification lies in their semantics. It proposes a semantics-based framework for reasoning about malware detectors and proving properties such as soundness and completeness of these detectors. Our approach uses a trace semantics to characterize the behavior of malware as well as that of the program being checked for infection, and uses abstract interpretation to "hide" irrelevant aspects of these behaviors. As a concrete application of our approach, we show that (1) standard signature matching detection schemes are generally sound but not complete, (2) the semantics-aware malware detector proposed by Christodorescu et al. is complete with respect to a number of common obfuscations used by malware writers and (3) the malware detection scheme proposed by Kinder et al. and based on standard model-checking techniques is sound in general and complete on some, but not all, obfuscations handled by the semantics-aware malware detector.
引用
收藏
页数:54
相关论文
共 50 条
  • [41] SEMANTICS-BASED PROGRAM INTEGRATION
    REPS, T
    HORWITZ, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 300 : 1 - 20
  • [42] Semantics-based retrieval by content
    Del Bimbo, A
    2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, : 516 - 519
  • [43] Anticipating Dormant Functionality in Malware - A Semantics based Approach
    Noor, Muzzamil
    Abbas, Haider
    2013 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2013, : 20 - 23
  • [44] Schema-less, semantics-based change detection for XML documents
    Zhang, SH
    Dyreson, C
    Snodgrass, RT
    WEB INFORMATION SYSTEMS - WISE 2004, PROCEEDINGS, 2004, 3306 : 279 - 290
  • [45] Human-centric and semantics-based explainable event detection: a survey
    Taiwo Kolajo
    Olawande Daramola
    Artificial Intelligence Review, 2023, 56 : 119 - 158
  • [46] Syntax, and semantics-based signature database for hybrid intrusion detection systems
    Barry, Bazara I. A.
    Chan, Anthony
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (06) : 457 - 475
  • [47] Human-centric and semantics-based explainable event detection: a survey
    Kolajo, Taiwo
    Daramola, Olawande
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (SUPPL 1) : 119 - 158
  • [48] Semantics-based binary code automated de-obfuscation approach
    Guo J.
    Wang L.
    Tang Z.
    Fang D.
    2016, Huazhong University of Science and Technology (44): : 55 - 59
  • [49] CONSTDET: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs
    Wei, Xiaomin
    Sun, Cong
    Lyu, Minjie
    Song, Qipeng
    Li, Yue
    REMOTE SENSING, 2022, 14 (21)
  • [50] Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
    Jebbaoui, Hussein
    Mourad, Azzam
    Otrok, Hadi
    Haraty, Ramzi
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 : 91 - 103