2010 IEEE Symposium on Security and Privacy 2010
DOI: 10.1109/sp.2010.12
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Dormant Functionality in Malware Programs

Abstract: Abstract-To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malware analysis typically follow a dynamic approach, executing an unknown program in a controlled environment (sandbox) and recording its runtime behavior. Since dynamic analysis platforms directly run malicious code, they are resilient to popular malware defense techniques such as packing and code obfuscation. Unfortunately, in many… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 83 publications
(50 citation statements)
references
References 32 publications
(50 reference statements)
0
50
0
Order By: Relevance
“…Each sub-graph can be conveniently represented and efficiently matched using a hash. This technique is proven to be resilient against polymorphism [19] and was successfully used in recent samples by Comparetti et al in [6]. Finally, we normalize the API function names (e.g, removing 'A','W','Ex' suffixes referring to different versions of the same function).…”
Section: Database Of Behaviorsmentioning
confidence: 99%
See 3 more Smart Citations
“…Each sub-graph can be conveniently represented and efficiently matched using a hash. This technique is proven to be resilient against polymorphism [19] and was successfully used in recent samples by Comparetti et al in [6]. Finally, we normalize the API function names (e.g, removing 'A','W','Ex' suffixes referring to different versions of the same function).…”
Section: Database Of Behaviorsmentioning
confidence: 99%
“…In addition to the fingerprint information that is useful for fast indexing, we store the static information associated to each behavior as a set of offsets that identify the code into the binary. Therefore, this dictionary can be used to statically match behaviors, both in new, unseen binaries, or in binaries where such behaviors are implemented but "dormant" [6]. Notably, the ability to produce both a static and dynamic description of behaviors is useful because in this way we are not bound to dynamic analysis to identify behavior in samples.…”
Section: Step 3: Behavior Extractionmentioning
confidence: 99%
See 2 more Smart Citations
“…In [35], Kolbitsch et al proposed a multipath execution scheme for Java-script-based malware. Other research [29,46] proposed techniques to enforce execution of different malware functionalities.…”
Section: Related Workmentioning
confidence: 99%