MetaAware: Identifying metamorphic malware

被引:47
|
作者
Zhang, Qinghua [1 ]
Reeves, Douglas S. [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Cyber Def Lab, Raleigh, NC 27695 USA
关键词
D O I
10.1109/ACSAC.2007.9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamorphic malware) will invalidate the use of a fixed signature, without changing the harmful effects of the software. This paper presents a new approach for recognizing metamorphic malware. The method usesfully automated static analysis of executables to summarize and compare program semantics, based primarily on the pattern of library or system functions which are called. The proposed method has been prototyped and evaluated using randomized benchmark programs, instances of known malware program variants, and utility software available in multiple releases. The results demonstrate three important capabilities of the proposed method: (a) it does well at identifying metamorphic variants of common malware; (b) it distinguishes easily between programs that are not related; and, (c) it can identify and detect program variations, or code reuse. Such variations can be due to insertion of malware (such as viruses) into the executable of a host program. We argue that this method of metamorphic code detection will be difficult for malware writers to bypass.
引用
收藏
页码:411 / 420
页数:10
相关论文
共 50 条
  • [21] A Compression-Based Technique to Classify Metamorphic Malware
    Ekhtoom, Duaa
    Al-Ayyoub, Mahmoud
    Al-Saleh, Mohammed
    Alsmirat, Mohammad
    Hmeidi, Ismail
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [22] Opcodes Histogram for Classifying Metamorphic Portable Executables Malware
    Rad, Babak Bashari
    Masrom, Maslin
    Ibrahim, Suahimi
    2012 INTERNATIONAL CONFERENCE ON E-LEARNING AND E-TECHNOLOGIES IN EDUCATION (ICEEE), 2012, : 209 - 213
  • [23] Classification of polymorphic and metamorphic malware samples based on their behavior
    Tsyganok, Ksenia
    Tumoyan, Evgeny
    Anikeev, Maxim
    Babenko, Liudmila
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 111 - 116
  • [24] Effective methods to detect metamorphic malware: a systematic review
    Irshad, Mustafa
    al-Khateeb, Haider M.
    Mansour, Ali
    Ashawa, Moses
    Hamisu, Muhammad
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (02) : 138 - 154
  • [25] Enhancing the detection of metamorphic malware using call graphs
    Elhadi, Ammar Ahmed E.
    Maarof, Mohd Aizaini
    Barry, Bazara I. A.
    Hamza, Hentabli
    COMPUTERS & SECURITY, 2014, 46 : 62 - 78
  • [26] Annotated Control Flow Graph for Metamorphic Malware Detection
    Alam, Shahid
    Traore, Issa
    Sogukpinar, Ibrahim
    COMPUTER JOURNAL, 2015, 58 (10): : 2608 - 2621
  • [27] Identifying Dormant Functionality in Malware Programs
    Comparetti, Paolo Milani
    Salvaneschi, Guido
    Kirda, Engin
    Kolbitsch, Clemens
    Kruegel, Christopher
    Zanero, Stefano
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 61 - 76
  • [28] Identifying meaningful clusters in malware data
    de Amorim, Renato Cordeiro
    Ruiz, Carlos David Lopez
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 177
  • [29] Identifying Behavior Dispatchers for Malware Analysis
    Park, Kyuhong
    Sahin, Burak
    Chen, Yongheng
    Zhao, Jisheng
    Downing, Evan
    Hu, Hong
    Lee, Wenke
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 759 - 773
  • [30] Babble: Identifying Malware by Its Dialects
    Mohaisen, Aziz
    Alrawi, Omar
    West, Andrew G.
    Mankin, Allison
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 407 - 408