2008
DOI: 10.1007/s11416-008-0086-0
|View full text |Cite
|
Sign up to set email alerts
|

Behavioral detection of malware: from a survey towards an established taxonomy

Abstract: Behavioral detection differs from appearance detection in that it identifies the actions performed by the malware rather than syntactic markers. Identifying these malicious actions and interpreting their final purpose is a complex reasoning process. This paper draws up a survey of the different reasoning techniques deployed among the behavioral detectors. These detectors have been classified according to a new taxonomy introduced inside the paper. Strongly inspired from the domain of program testing, this taxo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
88
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 178 publications
(89 citation statements)
references
References 29 publications
0
88
0
1
Order By: Relevance
“…It detects anomalies in the observed behavior compared to its model of normal behavior, which is often program-specific, to identify malware. A large number of software malware detectors have been investigated that vary in terms of the monitored events, the normal behavior model, and the detection algorithm [30,51,34,33,38]. The advantage of dynamic detection is that it is resilient to metamorphic and polymorphic malware [44,39]; it can even detect previously unknown malware.…”
Section: Related Workmentioning
confidence: 99%
“…It detects anomalies in the observed behavior compared to its model of normal behavior, which is often program-specific, to identify malware. A large number of software malware detectors have been investigated that vary in terms of the monitored events, the normal behavior model, and the detection algorithm [30,51,34,33,38]. The advantage of dynamic detection is that it is resilient to metamorphic and polymorphic malware [44,39]; it can even detect previously unknown malware.…”
Section: Related Workmentioning
confidence: 99%
“…As shown by a recent quantitative analysis [40], a combination of static and dynamic analysis, creating so-called hybrid approaches, is the key to achieve the best recall and precision. We observe that previous work revolve around the concept of behavior [16,26], which is leveraged as the bridge between static an dynamic techniques. This concept has been used for various purposes, ranging from classification to analysis [21] and detection.…”
Section: Binary Analysis and Reverse Engineeringmentioning
confidence: 97%
“…Malware, just like any other running program, use the services provided by the host system to sent inputs to processor, memory, programs and other operating resources [12]. It works by sandbox the execution of a file and observe how the file is actually run.…”
Section: B Behavior-basedmentioning
confidence: 99%