메뉴 건너뛰기




Volumn 10, Issue 12, 2015, Pages 2591-2604

Employing Program Semantics for Malware Detection

Author keywords

Malware; Malware Detection; Semantically relevant paths; System call injection attacks; System calls

Indexed keywords

BINS; COMPUTER CRIME; FEATURE EXTRACTION; INFORMATION THEORY; INTRUSION DETECTION; NETWORK SECURITY; SEMANTICS;

EID: 84960933928     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2469253     Document Type: Article
Times cited : (94)

References (56)
  • 2
    • 84960873897 scopus 로고    scopus 로고
    • AV-Test. (Nov. 2014). [Online] Available
    • AV-Test. (Nov. 2014). AV-Test Malware Statistics. [Online]. Available: http://www.av-test.org/en/statistics/malware/
    • AV-Test Malware Statistic
  • 3
    • 84871698137 scopus 로고    scopus 로고
    • What you see predicts what you get-Lightweight agent-based malware detection
    • W. Wang, I. Murynets, J. Bickford, C. Van Wart, G. Xu, "What you see predicts what you get-Lightweight agent-based malware detection," Secur. Commun. Netw., vol. 6, no. 1, pp. 33-48, 2013.
    • (2013) Secur. Commun. Netw , vol.6 , Issue.1 , pp. 33-48
    • Wang, W.1    Murynets, I.2    Bickford, J.3    Van Wart, C.4    Xu, G.5
  • 4
    • 0037269111 scopus 로고    scopus 로고
    • Reliable identification of bounded-length viruses is NP-complete
    • Jan.
    • D. Spinellis, "Reliable identification of bounded-length viruses is NP-complete," IEEE Trans. Inf. Theory, vol. 49, no. 1, pp. 280-284, Jan. 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.1 , pp. 280-284
    • Spinellis, D.1
  • 6
    • 84893366993 scopus 로고    scopus 로고
    • Growing grapes in your computer to defend against malware
    • Feb.
    • Z. Shan and X. Wang, "Growing grapes in your computer to defend against malware," IEEE Trans. Inf. Forensics Security, vol. 9, no. 2, pp. 196-207, Feb. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.2 , pp. 196-207
    • Shan, Z.1    Wang, X.2
  • 10
    • 84880591959 scopus 로고    scopus 로고
    • ENDMal: An antiobfuscation and collaborative malware detection system using syscall sequences
    • H. Lu, X. Wang, B. Zhao, F. Wang, J. Su, "ENDMal: An antiobfuscation and collaborative malware detection system using syscall sequences," Math. Comput. Model., vol. 58, nos. 5-6, pp. 1140-1154, 2013.
    • (2013) Math. Comput. Model , vol.58 , Issue.5-6 , pp. 1140-1154
    • Lu, H.1    Wang, X.2    Zhao, B.3    Wang, F.4    Su, J.5
  • 11
    • 84888873413 scopus 로고    scopus 로고
    • Deriving common malware behavior through graph clustering
    • Nov.
    • Y. Park, D. S. Reeves, M. Stamp, "Deriving common malware behavior through graph clustering," Comput. Secur., vol. 39, pp. 419-430, Nov. 2013.
    • (2013) Comput. Secur , vol.39 , pp. 419-430
    • Park, Y.1    Reeves, D.S.2    Stamp, M.3
  • 13
    • 84860630143 scopus 로고    scopus 로고
    • Shadow attacks: Automatically evading system-call-behavior based malware detection
    • W. Ma, P. Duan, S. Liu, G. Gu, J.-C. Liu, "Shadow attacks: Automatically evading system-call-behavior based malware detection," J. Comput. Virol., vol. 8, nos. 1-2, pp. 1-13, 2012.
    • (2012) J. Comput. Virol , vol.8 , Issue.1-2 , pp. 1-13
    • Ma, W.1    Duan, P.2    Liu, S.3    Gu, G.4    Liu, J.-C.5
  • 18
    • 84889281816 scopus 로고    scopus 로고
    • (Wiley Series in Telecommunications and Signal Processing), 2nd ed New York, NY, USA: Wiley Jul.
    • T. M. Cover and J. A. Thomas, Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing), 2nd ed. New York, NY, USA: Wiley, Jul. 2006.
    • (2006) Elements of Information Theory
    • Cover, T.M.1    Thomas, J.A.2
  • 19
    • 80052815523 scopus 로고    scopus 로고
    • Typical paths of a graph
    • Jan.
    • C. Cui, Z. Dang, T. R. Fischer, "Typical paths of a graph," Fundam. Inf., vol. 110, nos. 1-4, pp. 95-109, Jan. 2011.
    • (2011) Fundam. Inf , vol.110 , Issue.1-4 , pp. 95-109
    • Cui, C.1    Dang, Z.2    Fischer, T.R.3
  • 20
    • 84874684616 scopus 로고    scopus 로고
    • Classification of malware based on integrated static and dynamic features
    • R. Islam, R. Tian, L. M. Batten, S. Versteeg, "Classification of malware based on integrated static and dynamic features," J. Netw. Comput. Appl., vol. 36, no. 2, pp. 646-656, 2013.
    • (2013) J. Netw. Comput. Appl , vol.36 , Issue.2 , pp. 646-656
    • Islam, R.1    Tian, R.2    Batten, L.M.3    Versteeg, S.4
  • 21
    • 84906826065 scopus 로고    scopus 로고
    • Behavioral classification and detection of malware through HTTP user agent anomalies
    • N. Kheir, "Behavioral classification and detection of malware through HTTP user agent anomalies," J. Inf. Secur. Appl., vol. 18, no. 1, pp. 2-13, 2013.
    • (2013) J. Inf. Secur. Appl , vol.18 , Issue.1 , pp. 2-13
    • Kheir, N.1
  • 22
    • 42749086128 scopus 로고    scopus 로고
    • Detection of unknown computer worms based on behavioral classification of the host
    • R. Moskovitch, Y. Elovici, L. Rokach, "Detection of unknown computer worms based on behavioral classification of the host," Comput. Statist. Data Anal., vol. 52, no. 9, pp. 4544-4566, 2008.
    • (2008) Comput. Statist. Data Anal , vol.52 , Issue.9 , pp. 4544-4566
    • Moskovitch, R.1    Elovici, Y.2    Rokach, L.3
  • 30
    • 80255137449 scopus 로고    scopus 로고
    • Graph-based malware detection using dynamic analysis
    • B. Anderson, D. Quist, J. Neil, C. Storlie, T. Lane, "Graph-based malware detection using dynamic analysis," J. Comput. Virol., vol. 7, no. 4, pp. 247-258, 2011.
    • (2011) J. Comput. Virol , vol.7 , Issue.4 , pp. 247-258
    • Anderson, B.1    Quist, D.2    Neil, J.3    Storlie, C.4    Lane, T.5
  • 31
    • 84863215860 scopus 로고    scopus 로고
    • Recognizing malicious software behaviors with tree automata inference
    • Aug.
    • D. Babíc, D. Reynaud, D. Song, "Recognizing malicious software behaviors with tree automata inference," Formal Methods Syst. Design, vol. 41, no. 1, pp. 107-128, Aug. 2012.
    • (2012) Formal Methods Syst. Design , vol.41 , Issue.1 , pp. 107-128
    • Babíc, D.1    Reynaud, D.2    Song, D.3
  • 33
    • 0003781238 scopus 로고    scopus 로고
    • Cambridge U.K.: Cambridge Univ Press
    • J. R. Norris, Markov Chains. Cambridge, U.K.: Cambridge Univ. Press, 1998.
    • (1998) Markov Chains
    • Norris, J.R.1
  • 34
    • 0021487630 scopus 로고
    • Parallel graph algorithms
    • Sep.
    • M. J. Quinn and N. Deo, "Parallel graph algorithms," ACM Comput. Surv., vol. 16, no. 3, pp. 319-348, Sep. 1984.
    • (1984) ACM Comput. Surv , vol.16 , Issue.3 , pp. 319-348
    • Quinn, M.J.1    Deo, N.2
  • 37
    • 0035478854 scopus 로고    scopus 로고
    • Random forests
    • L. Breiman, "Random forests," Mach. Learn., vol. 45, no. 1, pp. 5-32, 2001.
    • (2001) Mach. Learn , vol.45 , Issue.1 , pp. 5-32
    • Breiman, L.1
  • 38
    • 0032139235 scopus 로고    scopus 로고
    • The random subspace method for constructing decision forests
    • Aug.
    • T. K. Ho, "The random subspace method for constructing decision forests," IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 8, pp. 832-844, Aug. 1998.
    • (1998) IEEE Trans. Pattern Anal. Mach. Intell , vol.20 , Issue.8 , pp. 832-844
    • Ho, T.K.1
  • 39
    • 21644433634 scopus 로고    scopus 로고
    • Xen and the art of virtualization
    • Dec.
    • P. Barham et al., "Xen and the art of virtualization," ACM SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 164-177, Dec. 2003.
    • (2003) ACM SIGOPS Oper. Syst. Rev , vol.37 , Issue.5 , pp. 164-177
    • Barham, P.1
  • 40
    • 84882639451 scopus 로고    scopus 로고
    • Malware detection by behavioural sequential patterns
    • M. Ahmadi, A. Sami, H. Rahimi, B. Yadegari, "Malware detection by behavioural sequential patterns," Comput. Fraud Secur., vol. 2013, no. 8, pp. 11-19, 2013.
    • (2013) Comput. Fraud Secur , vol.2013 , Issue.8 , pp. 11-19
    • Ahmadi, M.1    Sami, A.2    Rahimi, H.3    Yadegari, B.4
  • 41
    • 84960934168 scopus 로고    scopus 로고
    • VirusTotal. Feb [Online] Available
    • VirusTotal. (Feb. 2015). File Types Statistics. [Online]. Available: https://www.virustotal.com/en/statistics/
    • (2015) File Types Statistics
  • 44
    • 79955074151 scopus 로고    scopus 로고
    • Improving antivirus accuracy with hypervisor assisted analysis
    • May
    • D. Quist, L. Liebrock, J. Neil, "Improving antivirus accuracy with hypervisor assisted analysis," J. Comput. Virol., vol. 7, no. 2, pp. 121-131, May 2011.
    • (2011) J. Comput. Virol , vol.7 , Issue.2 , pp. 121-131
    • Quist, D.1    Liebrock, L.2    Neil, J.3
  • 45
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • T. Fawcett, "An introduction to ROC analysis," Pattern Recognit. Lett., vol. 27, no. 8, pp. 861-874, 2006.
    • (2006) Pattern Recognit. Lett , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1
  • 46
    • 0016870630 scopus 로고
    • An algorithm for subgraph isomorphism
    • Jan.
    • J. R. Ullmann, "An algorithm for subgraph isomorphism," J. ACM, vol. 23, no. 1, pp. 31-42, Jan. 1976.
    • (1976) J ACM , vol.23 , Issue.1 , pp. 31-42
    • Ullmann, J.R.1
  • 48
    • 84960942412 scopus 로고    scopus 로고
    • Microsoft. Feb. [Online] Available
    • Microsoft. (Feb. 2015). Kernel Object. [Online]. Available: https://msdn. microsoft.com/en-us/library/ms724485%28VS.85%29.aspx
    • (2015) Kernel Object
  • 49
    • 85026953361 scopus 로고    scopus 로고
    • Boost-Software. Feb. [Online] Available
    • Boost-Software. (Feb. 2015). Graph Library. [Online]. Available: http://sourceforge.net/projects/boost/files/boost/1.57.0/boost-1-57-0.tar. gz/download
    • (2015) Graph Library


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.