Title :
Malware Behavior Capturing Based on Taint Propagation and Stack Backtracing
Author :
Jianming, Fu ; Xinwen, Liu ; Binling, Cheng
Author_Institution :
Wuhan Univ., Wuhan, China
Abstract :
Although dynamic analysis is immune to polymorphic, metamorphic, and encryption techniques, it is an open issue how to precisely capture behavior of malware. A connection between system call and its module has been constructed using taint propagation and stack backtracing, and a method of capturing malware behavior is presented on the basis of this connection1. This method works well on parasitic malware and the analysis results are more concise. Finally, a prototype Module-based Analysis Tool (MAT) on Windows XP has been implemented. The experimental results show that MAT can capture well behaviors of most kinds of malwares, and locate the real malicious module, which is very useful to remove malware.
Keywords :
invasive software; MAT; Windows XP; encryption techniques; malware behavior capturing; metamorphic techniques; prototype module-based analysis tool; stack backtracing; taint propagation; Kernel; Malware; Monitoring; Registers; dynamic analysis; malware; module monitor; stack backtracing; taint propagation;
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on
Conference_Location :
Changsha
Print_ISBN :
978-1-4577-2135-9
DOI :
10.1109/TrustCom.2011.43