首页> 外文会议>Military Communications Conference;MILCOM 2012 >Detection of global, metamorphic malware variants using control and data flow analysis
【24h】

Detection of global, metamorphic malware variants using control and data flow analysis

机译:使用控制和数据流分析检测全局,变态的恶意软件变体

获取原文
获取原文并翻译 | 示例

摘要

Current malware detection and classification tools fail to adequately address variants that are generated automatically using new polymorphic and metamorphic transformation engines that can produce variants that bear no resemblance to one another. Current approaches address this problem by employing syntactic signatures that mimic the underlying control structures such as call- and flow-graphs. These techniques, however, are easily defeated using new program diversification techniques. This hampers our ability to defend against zero day attacks perpetrated by such auto “replicating”, rapidly spreading malware variants. In this paper, we present a new form of abstract malware signature generation that is based on extracting semantic summaries of malware code that is immune to most polymorphic and metamorphic transformations. We also present results of our initial, experimental evaluation of the proposed approach.
机译:当前的恶意软件检测和分类工具无法充分解决使用新的多态和变质转换引擎自动生成的变体的问题,这些引擎可以产生彼此不相似的变体。当前的方法通过采用模仿底层控制结构(如调用图和流程图)的句法签名来解决此问题。但是,使用新的程序多样化技术很容易击败这些技术。这阻碍了我们抵御由此类自动“复制”,快速传播的恶意软件变体造成的零日攻击的能力。在本文中,我们提出了一种新形式的抽象恶意软件签名生成,它基于提取不受大多数​​多态和变态转换影响的恶意软件代码的语义摘要。我们还介绍了对所提出方法的初步实验评估结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号