Title :
Employing Program Semantics for Malware Detection
Author :
Naval, Smita ; Laxmi, Vijay ; Rajarajan, Muttukrishnan ; Gaur, Manoj Singh ; Conti, Mauro
Author_Institution :
Dept. of Comput. Sci. & Eng., Malaviya Nat. Inst. of Technol. at Jaipur, Jaipur, India
Abstract :
In recent years, malware has emerged as a critical security threat. In addition, malware authors continue to embed numerous anti-detection features to evade the existing malware detection approaches. Against this advanced class of malicious programs, dynamic behavior-based malware detection approaches outperform the traditional signature-based approaches by neutralizing the effects of obfuscation and morphing techniques. The majority of dynamic behavior detectors rely on system-calls to model the infection and propagation dynamics of malware. However, these approaches do not account an important anti-detection feature of modern malware, i.e., systemcall injection attack. This attack allows the malicious binaries to inject irrelevant and independent system-calls during the program execution thus modifying the execution sequences defeating the existing system-call-based detection. To address this problem, we propose an evasion-proof solution that is not vulnerable to system-call injection attacks. Our proposed approach characterizes program semantics using asymptotic equipartition property (AEP) mainly applied in information theoretic domain. The AEP allows us to extract information-rich call sequences that are further quantified to detect the malicious binaries. Furthermore, the proposed detection model is less vulnerable to call-injection attacks as the discriminating components are not directly visible to malware authors. We run a thorough set of experiments to evaluate our solution and compare it with the existing system-call-based malware detection techniques. The results demonstrate that the proposed solution is effective in identifying real malware instances.
Keywords :
invasive software; AEP; antidetection features; asymptotic equipartition property; critical security threat; dynamic behavior-based malware detection approaches; evasion-proof solution; infection dynamics; information-rich call sequences; malicious programs; malware authors; malware instances; program execution; program semantics; propagation dynamics; system-call injection attack; system-call-based malware detection techniques; Feature extraction; Forensics; Malware; Semantics; Silicon; Tin; Malware; Malware Detection; Semantically-relevant paths; System-call injection attacks; System-calls; malware detection; semantically-relevant paths; system-call injection attacks; system-calls;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2015.2469253