DocumentCode :
1592522
Title :
Using Markov chains to filter machine-morphed variants of malicious programs
Author :
Chouchane, Mohamed R. ; Walenstein, Andrew ; Lakhotia, Arun
Author_Institution :
Center for Adv. Comput. Studies, Univ. of Louisiana at Lafayette, Lafayette, LA
fYear :
2008
Firstpage :
77
Lastpage :
84
Abstract :
Of the enormous quantity of malicious programs seen in the wild, most are variations of previously seen programs. Automated program transformation tools-i.e., code morphers-are one of the ways of making such variants in volume. This paper proposes a Markov chain-based framework for fast, approximate detection of variants of known morphers wherein every morphing operation independently and predictably alters quickly-checked global program properties. Specifically, identities from Markov chain theory are applied to approximately determine whether a given program may be a variant created from some given previous program, or whether it definitely is not. The framework is used to define a method for finding telltale signs of the use of closed-world, instruction-substituting transformers within the frequencies of instruction forms found in a program. This decision method may yield a fast technique to aid malware detection.
Keywords :
Markov processes; invasive software; mathematics computing; Markov chains; automated program transformation tools; code morphers; machine-morphed variants; malicious programs; malware detection; quickly-checked global program properties; Approximation algorithms; Cryptography; Encoding; Engines; Filtering; Filters; Frequency; Genetic mutations; Testing; Transformers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on
Conference_Location :
Fairfax, VI
Print_ISBN :
978-1-4244-3288-2
Electronic_ISBN :
978-1-4244-3289-9
Type :
conf
DOI :
10.1109/MALWARE.2008.4690861
Filename :
4690861
Link To Document :
بازگشت