DocumentCode :
153248
Title :
Malicious Behavior Patterns
Author :
Dornhackl, Hermann ; Kadletz, Konstantin ; Luh, Robert ; Tavolato, Paul
Author_Institution :
Inst. of IT Security Res., Univ. of Appl. Sci., St. Pölten, Austria
fYear :
2014
fDate :
7-11 April 2014
Firstpage :
384
Lastpage :
389
Abstract :
This paper details a schema developed for defining malicious behavior in software. The presented approach enables malware analysts to identify and categorize malicious software through its high-level goals as well as down to the individual functions executed on operating system level. We demonstrate the practical application of the schema by mapping dynamically extracted system call patterns to a comprehensive hierarchy of malicious behavior.
Keywords :
invasive software; object-oriented methods; malicious behavior patterns; malware analyst; operating system level; Availability; Grammar; Malware; Payloads; Reconnaissance; Software; Vectors; behavior pattern; formal grammar; malware;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on
Conference_Location :
Oxford
Type :
conf
DOI :
10.1109/SOSE.2014.52
Filename :
6830934
Link To Document :
بازگشت