DocumentCode
1925119
Title
Preventing insider malware threats using program analysis techniques
Author
Agrawal, Hira ; Alberi, James ; Bahler, Lisa ; Conner, William ; Micallef, Josephine ; Virodov, Alexandr ; Snyder, Shane R
Author_Institution
Telcordia Technol., Piscataway, NJ, USA
fYear
2010
fDate
Oct. 31 2010-Nov. 3 2010
Firstpage
936
Lastpage
941
Abstract
Current malware detection tools focus largely on malicious code that is injected into target programs by outsiders by exploiting inadvertent vulnerabilities such as failing to guard against a buffer overflow or failure to properly validate a user input in those programs. Hardly any attention is paid to threats arising from software developers, who, with their intimate knowledge of the inner workings of those programs, can easily sneak logic bombs, Trojan horses, and backdoors in those programs. Traditional software validation techniques such as testing based on user requirements are unlikely to detect such malware, because normal use cases will not trigger them and thus will fail to expose them. The state-of-the-art in preventing such malware involves manual inspection of the target program, which is a highly tedious, time consuming, and error prone process. We propose a dynamic, test driven approach that automatically steers program analysts towards examining and discovering such insider malware threats. It uses program analysis techniques to identify program parts whose execution automatically guarantees execution of a large number of previously unexplored parts of the program. It effectively leads analysts into creating test cases which may trigger, in a protected test environment, any malware code hidden in that application as early as possible, so it can be removed from the application before it is deployed in the field. We also present a tool that helps translate this approach into practice.
Keywords
invasive software; program diagnostics; program testing; program verification; Trojan horses; buffer overflow; insider malware threats; logic bombs; malicious code; malware detection; program analysis; software developers; software validation; Color; Programming; Software; Testing; Trojan horses; Weapons; Trojan horse; backdoor; insider malware threats; life cycle attacks; logic bomb; malicious code detection; time bomb;
fLanguage
English
Publisher
ieee
Conference_Titel
MILITARY COMMUNICATIONS CONFERENCE, 2010 - MILCOM 2010
Conference_Location
San Jose, CA
ISSN
2155-7578
Print_ISBN
978-1-4244-8178-1
Type
conf
DOI
10.1109/MILCOM.2010.5679584
Filename
5679584
Link To Document