Obfuscated malware detection using API call dependency

SecurIT '12: Proceedings of the First International Conference on Security of Internet of Things(2012)

引用 9|浏览0
暂无评分
摘要
Malwares pose a grave threat to security of a network and host systems. Many events such as Distributed Denial-of-Service attacks, spam emails etc., often have malwares as their root cause. So a great deal of research is being invested in detection and removal of malwares. Thus many malware detection systems or antivirus softwares have come up. But the drawback of these antivirus softwares is they rely upon signature matching approach for malware detection which can be easily defeated using simple code obfuscation techniques. This has given rise to a new generation of metamorphic and polymorphic malwares. In this paper we proposed the approach of monitoring interdependent system calls to detect obfuscated malicious programs. We took some sample malwares and some common obfuscation techniques. We tested these obfuscated malwares against open source antivirus ClamAV and our detection model. The results obtained have been elaborated further in the paper. Again how our algorithm is sound against many drawbacks of the API call monitoring approach such as API call reordering, garbage API call insertion etc., are also described.
更多
查看译文
关键词
common obfuscation technique,malware detection,malware detection system,api call dependency,sample malwares,detection model,antivirus software,api call reordering,obfuscated malware detection,garbage api call,polymorphic malwares,obfuscated malwares,malware,obfuscation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要