Title :
Dynamic malware detection using registers values set analysis
Author :
Ghiasi, Mohaddeseh ; Sami, Ashkan ; Salehi, Z.
Author_Institution :
CSE & IT Dept., Shiraz Univ., Shiraz, Iran
Abstract :
The number of Malicious files increase every day because of existing open source malware and obfuscation techniques. It means that traditional signature-based techniques are not adequate for detecting new variant of malware. Researchers and anti malware companies recently focus on more advanced protection which needs influential pattern extraction techniques. In this paper, a novel method is proposed based on similarities of binaries behaviors. At first, Run-time behavior of the binary files are found and logged in a controlled environment tool which is developed in-house. The approach assumes that behavior of each binary can be represented by the values of memory contents in its run-time. That is, values stored in different registers while the malware is running in the controlled environment can be a distinguishing factor to set it apart from those of benign programs. Then, the register values for each Application Programming Interface (API) call are extracted before and after API is invoked. After that, we traced the distribution and changes of registers values throughout the executable file and created a vector for each of the values of EAX, EBX, EDX, EDI, ESI and EBP registers. With comparing the similarity measures between old and unseen malware vectors, we detected 98% of unseen samples and with 2.9% false positive.
Keywords :
application program interfaces; digital signatures; invasive software; public domain software; API registers; EAX registers; EBP registers; EBX registers; EDI registers; EDX registers; ESI registers; antimalware companies; application programming interface; benign programs; binary files; controlled environment tool; dynamic malware detection; malicious files; obfuscation techniques; open source malware; pattern extraction techniques; registers values set analysis; signature-based techniques; Accuracy; Data mining; Feature extraction; Indexes; Malware; Monitoring; Registers; API Call; Dynamic Analysis; Malware Detection; Memory Content; Register Value;
Conference_Titel :
Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
Conference_Location :
Tabriz
Print_ISBN :
978-1-4673-2387-1
DOI :
10.1109/ISCISC.2012.6408191