Can Monitoring System State + Counting Custom Instruction Sequences Aid Malware Detection?

2019 IEEE 28th Asian Test Symposium (ATS)(2019)

引用 5|浏览28
暂无评分
摘要
Signature and behavior-based anti-virus systems (AVS) are traditionally used to detect Malware. However, these AVS fail to catch metamorphic and polymorphic Malware-which can reconstruct themselves every generation or every instance. We introduce two Machine learning (ML) approaches on system state + instruction sequences - which use hardware debug data - to detect such challenging Malware. Our experiments on hundreds of Intel Malware samples show that the techniques either alone or jointly detect Malware with ≥ 99.5% accuracy.
更多
查看译文
关键词
Debug Hardware, Malware, Hardware Performance Counters, Instruction Sequencing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要