DocumentCode :
1010870
Title :
Proactive Detection of Computer Worms Using Model Checking
Author :
Kinder, Johannes ; Katzenbeisser, Stefan ; Schallhart, Christian ; Veith, Helmut
Author_Institution :
Formal Methods in Syst. Eng. Group, Tech. Univ. Darmstadt, Darmstadt, Germany
Volume :
7
Issue :
4
fYear :
2010
Firstpage :
424
Lastpage :
438
Abstract :
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants mostly differ in their binary representation rather than their functionality, they can be recognized by analyzing the program behavior, even though they are not covered by the signature databases of current antivirus tools. Proactive malware detectors mitigate this risk by detection procedures that use a single signature to detect whole classes of functionally related malware without signature updates. It is evident that the quality of proactive detection procedures depends on their ability to analyze the semantics of the binary. In this paper, we propose the use of model checking-a well-established software verification technique-for proactive malware detection. We describe a tool that extracts an annotated control flow graph from the binary and automatically verifies it against a formal malware specification. To this end, we introduce the new specification language CTPL, which balances the high expressive power needed for malware signatures with efficient model checking algorithms. Our experiments demonstrate that our technique indeed is able to recognize variants of existing malware with a low risk of false positives.
Keywords :
computer viruses; formal specification; formal verification; specification languages; CTPL; antivirus tool; computer worm; control flow graph; expressive power; formal malware specification; model checking; proactive detection; proactive malware detector; signature database; software verification technique; specification language; trojan horses; Automatic control; Computer worms; Databases; Detectors; Electronic mail; Flow graphs; Invasive software; Power generation economics; Power system modeling; Viruses (medical); Invasive software; Model checking; model checking.;
fLanguage :
English
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1545-5971
Type :
jour
DOI :
10.1109/TDSC.2008.74
Filename :
4689469
Link To Document :
بازگشت