2010
DOI: 10.1109/tdsc.2008.74
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Detection of Computer Worms Using Model Checking

Abstract: Abstract-Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants mostly differ in their binary representation rather than their functionality, they can be recognized by analyzing the program behavior, even though they are not covered by the signature databases of current antivirus tools. Proactive malware detectors mitigate this risk by detection procedures which use a single signature to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 29 publications
0
21
0
Order By: Relevance
“…A number of techniques [12]- [16] have been presented for detecting polymorphic worms. Again, the technique used is highlighted, the worm characteristic leverage is indicated and the limitations of the technique are pointed out in the synthesis in Table 3.…”
Section: Polymorphic-signature Generation Schemesmentioning
confidence: 99%
“…A number of techniques [12]- [16] have been presented for detecting polymorphic worms. Again, the technique used is highlighted, the worm characteristic leverage is indicated and the limitations of the technique are pointed out in the synthesis in Table 3.…”
Section: Polymorphic-signature Generation Schemesmentioning
confidence: 99%
“…To evaluate the precision of the analysis, we count the number of distinct possible arguments that the analysis can detect for the final external call to printf, before invariably widening the values (since the Fibonacci sequence grows to infinity, an exhaustive presentation of all values is impossible). This metric is representative for an application in malware detection, for example, where possible arguments to external system calls are evaluated against a malware specification [7]. In fact, most reverse engineering applications will have similar precision requirements, since at the very least they require a precise set of possible VPC values for each location.…”
Section: Obfuscation and Analysis Targetsmentioning
confidence: 99%
“…In earlier work, we have argued for applying static analysis to x86 binaries, both for verifying specifications of API contracts [5] and to detect malware [7]. Static analysis can aid reverse engineering by extracting data flow information (invariants) about the program behavior.…”
Section: Introductionmentioning
confidence: 99%
“…Towards this aim, we propose in this paper to use modelchecking for virus detection. Model-checking has already been used for virus detection in [6,20,9,11,16,15,17]. However, these works model the program as a finite state graph (automaton).…”
Section: Introductionmentioning
confidence: 99%
“…CTPL was introduced in [16,15,17]. It can be seen as an extension of CTL with variables and quantifiers.…”
Section: Introductionmentioning
confidence: 99%