2010
DOI: 10.1007/978-3-642-15769-1_14
|View full text |Cite
|
Sign up to set email alerts
|

Modelling Metamorphism by Abstract Interpretation

Abstract: Abstract. Metamorphic malware apply semantics-preserving transformations to their own code in order to foil detection systems based on signature matching. In this paper we consider the problem of automatically extract metamorphic signatures from these malware. We introduce a semantics for self-modifying code, later called phase semantics, and prove its correctness by showing that it is an abstract interpretation of the standard trace semantics. Phase semantics precisely models the metamorphic code behavior by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 19 publications
(21 reference statements)
0
1
0
Order By: Relevance
“…In the context of adaptive systems this approach is impractical, since the presence of many different objects, which may interact in complex and even unpredictable ways, makes the system difficult to describe and the analysis a daunting task: considering all possible interactions and behaviours, including those which will never happen in the deployed system, could easily produce a combinatorial explosion. A key point to tackle these problems is to define suitable abstract semantics able to capture the structure of programs that change at run-time, taking inspiration from the techniques used for modelling self-modifying/metamorphic malware in [14].…”
Section: Abstract Interpretationmentioning
confidence: 99%
“…In the context of adaptive systems this approach is impractical, since the presence of many different objects, which may interact in complex and even unpredictable ways, makes the system difficult to describe and the analysis a daunting task: considering all possible interactions and behaviours, including those which will never happen in the deployed system, could easily produce a combinatorial explosion. A key point to tackle these problems is to define suitable abstract semantics able to capture the structure of programs that change at run-time, taking inspiration from the techniques used for modelling self-modifying/metamorphic malware in [14].…”
Section: Abstract Interpretationmentioning
confidence: 99%