Title :
Static analyzer of vicious executables (SAVE)
Author :
Sung, A.H. ; Xu, J. ; Chavez, P. ; Mukkamala, S.
Author_Institution :
Dept. of Comput. Sci., New Mexico Tech., Socorro, NM, USA
Abstract :
Software security assurance and malware (Trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that is useful for protecting software from reverse engineering, can also be used by hackers to circumvent the malware detection tools. Current static malware detection techniques have serious limitations, and sandbox testing also fails to provide a complete solution due to time constraints. In this paper, we present a robust signature-based malware detection technique, with emphasis on detecting obfuscated (or polymorphic) malware and mutated (or metamorphic) malware. The hypothesis is that all versions of the same malware share a common core signature that is a combination of several features of the code. After a particular malware has been first identified, it can be analyzed to extract the signature, which provides a basis for detecting variants and mutants of the same malware in the future. Encouraging experimental results on a large set of recent malware are presented.
Keywords :
computer viruses; digital signatures; program diagnostics; reverse engineering; software fault tolerance; SAVE; hacker; information security; malware detection; reverse engineering; sandbox testing; signature-based malware detection; software obfuscation; software security assurance; static analyzer; vicious executable; Computer hacking; Computer viruses; Computer worms; Information security; Protection; Reverse engineering; Robustness; Software tools; Testing; Time factors;
Conference_Titel :
Computer Security Applications Conference, 2004. 20th Annual
Print_ISBN :
0-7695-2252-1
DOI :
10.1109/CSAC.2004.37