首页> 外文期刊>IEEE transactions on information forensics and security >Data-Centric OS Kernel Malware Characterization
【24h】

Data-Centric OS Kernel Malware Characterization

机译:以数据为中心的OS内核恶意软件表征

获取原文
获取原文并翻译 | 示例
           

摘要

Traditional malware detection and analysis approaches have been focusing on code-centric aspects of malicious programs, such as detection of the injection of malicious code or matching malicious code sequences. However, modern malware has been employing advanced strategies, such as reusing legitimate code or obfuscating malware code to circumvent the detection. As a new perspective to complement code-centric approaches, we propose a data-centric OS kernel malware characterization architecture that detects and characterizes malware attacks based on the properties of data objects manipulated during the attacks. This framework consists of two system components with novel features: First, a runtime kernel object mapping system which has an un-tampered view of kernel data objects resistant to manipulation by malware. This view is effective at detecting a class of malware that hides dynamic data objects. Second, this framework consists of a new kernel malware detection approach that generates malware signatures based on the data access patterns specific to malware attacks. This approach has an extended coverage that detects not only the malware with the signatures, but also the malware variants that share the attack patterns by modeling the low level data access behaviors as signatures. Our experiments against a variety of real-world kernel rootkits demonstrate the effectiveness of data-centric malware signatures.
机译:传统的恶意软件检测和分析方法一直集中在恶意程序的以代码为中心的方面,例如检测恶意代码的注入或匹配恶意代码序列。但是,现代恶意软件一直在采用高级策略,例如重用合法代码或混淆恶意软件代码以规避检测​​。作为补充以代码为中心的方法的新观点,我们提出了一种以数据为中心的OS内核恶意软件表征架构,该架构根据攻击过程中操作的数据对象的属性来检测和表征恶意软件攻击。该框架由两个具有新颖功能的系统组件组成:首先,运行时内核对象映射系统,它具有不受恶意软件操纵的内核数据对象的完整视图。该视图可有效检测隐藏动态数据对象的一类恶意软件。其次,该框架由一种新的内核恶意软件检测方法组成,该方法可根据特定于恶意软件攻击的数据访问模式生成恶意软件签名。该方法具有扩展的覆盖范围,该覆盖范围不仅可以检测带有签名的恶意软件,还可以通过将低级数据访问行为建模为签名来检测共享攻击模式的恶意软件变体。我们针对各种实际内核rootkit进行的实验证明了以数据为中心的恶意软件签名的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号