Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 2007
DOI: 10.1145/1190216.1190270
|View full text |Cite
|
Sign up to set email alerts
|

A semantics-based approach to malware detection

Abstract: Malware detection is a crucial aspect of software security. Current malware detectors work by checking for "signatures," which attempt to capture (syntactic) characteristics of the machine-level byte sequence of the malware. This reliance on a syntactic approach makes such detectors vulnerable to code obfuscations, increasingly used by malware writers, that alter syntactic properties of the malware byte sequence without significantly affecting their execution behavior.This paper takes the position that the key… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(17 citation statements)
references
References 18 publications
0
17
0
Order By: Relevance
“…Thus a metamorphic virus cannot utilize [...] techniques that make it harder or impossible for its code to be disassembled or reverse engineered by itself." In agreement with this point of view, many static detection approaches based on de-obfuscation techniques (such as data flow analysis [1] and slicing [25]) were developed [6,22,28]. However, more complex obfuscation schemes based on control flow modifications such as [5], could thwart these static detection techniques.…”
Section: Metamorphism and Obfuscationmentioning
confidence: 99%
“…Thus a metamorphic virus cannot utilize [...] techniques that make it harder or impossible for its code to be disassembled or reverse engineered by itself." In agreement with this point of view, many static detection approaches based on de-obfuscation techniques (such as data flow analysis [1] and slicing [25]) were developed [6,22,28]. However, more complex obfuscation schemes based on control flow modifications such as [5], could thwart these static detection techniques.…”
Section: Metamorphism and Obfuscationmentioning
confidence: 99%
“…Indeed, we extend his result over metamorphic code. Even if this formal result seems far from detection in reality where false positives are acceptable, we believe that it could give birth to complex viruses able to thwart recent detection strategies like [4,20]. We will illustrate our metamorphic code obfuscator approach in Sect.…”
Section: Definition 3 Let Us Consider a Metamorphic Virusmentioning
confidence: 99%
“…Anyhow, static extraction remains possible as long as disassembly can be performed, which is a quite strong hypothesis because of the protection techniques mentioned previously. Theoretical works to assess the resistance of static semantic analyzers to obfuscation transformations have already been addressed by Preda et al [45].…”
Section: Data Collection and Interpretation: Static Extractionmentioning
confidence: 99%
“…The instructions stored in the nodes of the extracted graphs are often replaced by an associated label to reach a higher level of abstraction than simple assembly code. The labelling procedure may follow two approaches: either the instructions are translated into an intermediate representation carrying a semantic value [45,46] or instructions are reduced to their basic class of operation (arithmetic, logic, function call. .…”
Section: Matching Algorithms and Models: Annoted Graph Isomorphismmentioning
confidence: 99%