• DocumentCode
    153248
  • Title

    Malicious Behavior Patterns

  • Author

    Dornhackl, Hermann ; Kadletz, Konstantin ; Luh, Robert ; Tavolato, Paul

  • Author_Institution
    Inst. of IT Security Res., Univ. of Appl. Sci., St. Pölten, Austria
  • fYear
    2014
  • fDate
    7-11 April 2014
  • Firstpage
    384
  • Lastpage
    389
  • Abstract
    This paper details a schema developed for defining malicious behavior in software. The presented approach enables malware analysts to identify and categorize malicious software through its high-level goals as well as down to the individual functions executed on operating system level. We demonstrate the practical application of the schema by mapping dynamically extracted system call patterns to a comprehensive hierarchy of malicious behavior.
  • Keywords
    invasive software; object-oriented methods; malicious behavior patterns; malware analyst; operating system level; Availability; Grammar; Malware; Payloads; Reconnaissance; Software; Vectors; behavior pattern; formal grammar; malware;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on
  • Conference_Location
    Oxford
  • Type

    conf

  • DOI
    10.1109/SOSE.2014.52
  • Filename
    6830934