MetaAware: Identifying metamorphic malware

被引:47
|
作者
Zhang, Qinghua [1 ]
Reeves, Douglas S. [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Cyber Def Lab, Raleigh, NC 27695 USA
关键词
D O I
10.1109/ACSAC.2007.9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamorphic malware) will invalidate the use of a fixed signature, without changing the harmful effects of the software. This paper presents a new approach for recognizing metamorphic malware. The method usesfully automated static analysis of executables to summarize and compare program semantics, based primarily on the pattern of library or system functions which are called. The proposed method has been prototyped and evaluated using randomized benchmark programs, instances of known malware program variants, and utility software available in multiple releases. The results demonstrate three important capabilities of the proposed method: (a) it does well at identifying metamorphic variants of common malware; (b) it distinguishes easily between programs that are not related; and, (c) it can identify and detect program variations, or code reuse. Such variations can be due to insertion of malware (such as viruses) into the executable of a host program. We argue that this method of metamorphic code detection will be difficult for malware writers to bypass.
引用
收藏
页码:411 / 420
页数:10
相关论文
共 50 条
  • [1] Metamorphic Detection of Repackaged Malware
    Singh, Shirish
    Kaiser, Gail
    2021 IEEE/ACM 6TH INTERNATIONAL WORKSHOP ON METAMORPHIC TESTING (MET 2021), 2021, : 9 - 16
  • [2] The design space of metamorphic malware
    Walenstein, Andrew
    Mathur, Rachit
    Chouchane, Mohamed
    Lakhotia, Arun
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 241 - +
  • [3] Structural entropy and metamorphic malware
    Baysa, Donabelle
    Low, Richard M.
    Stamp, Mark
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2013, 9 (04): : 179 - 192
  • [4] Boolean Signatures for Metamorphic Malware
    Ranjan, Aditya Kaushal
    Ali, Raja
    Kumar, Vijay
    Hosseinzadeh, Minoo
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 255 - 262
  • [5] Metamorphic malware detection using base malware identification approach
    Mahawer, Devendra Kumar
    Nagaraju, A.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1719 - 1733
  • [6] DaCoMM: Detection and Classification of Metamorphic Malware
    Mehra, Vishakha
    Jain, Vinesh
    Uppal, Dolly
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 668 - 673
  • [7] A Novel Framework for Metamorphic Malware Detection
    Jha A.K.
    Vaish A.
    Patil S.
    SN Computer Science, 4 (1)
  • [8] Frequency Based Metamorphic Malware Detection
    Carkaci, Necmettin
    Sogukpmar, Ibrahim
    2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 421 - 424
  • [9] Hunting for metamorphic Java']JavaScript malware
    Musale, Mangesh
    Austin, Thomas H.
    Stamp, Mark
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (02): : 89 - 102
  • [10] Discriminant Features for Metamorphic Malware Detection
    Kuriakose, Jikku
    Vinod, P.
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 406 - 411