• DocumentCode
    2238653
  • Title

    Detecting Malicious Behavior Using Critical API-Calling Graph Matching

  • Author

    Bai, Lili ; Pang, Jianmin ; Zhang, Yichi ; Fu, Wen ; Zhu, Jiafeng

  • Author_Institution
    Nat. Digital Switching Syst. Eng. & Technol. Res. Center, Zhengzhou, China
  • fYear
    2009
  • fDate
    26-28 Dec. 2009
  • Firstpage
    1716
  • Lastpage
    1719
  • Abstract
    The proliferation of new malware in recent years has presented a serious security threat to our society. Research shows that variants of some known ones take a large amount of new malware, so one of the challenges in malware detection is how to find the similarities between known malware and its variants. Since API(Application Programming Interface)functions is used extensively to achieve the function of one program and It is difficult for different malware versions to conceal similarity on the functional flow level, making use of the similarity of their API-calling sequences is an essential detection method. In this paper, we present a new approach of malware detection based on critical API-calling Graph (CAG) matching rather than considering all API calls. More attention is paid on the illustration of how to extract a CAG from a control flow graph (CFG) for each malware to define a malicious behavior and how to detect the behavior in a suspicious executable using the CAG matching. This approach can overcome the drawbacks of two most common techniques adopted by current antivirus in detection of variants and unknown malware, which is demonstrated by the favorable experimental results.
  • Keywords
    application program interfaces; flow graphs; graph theory; invasive software; application programming interface; control flow graph; critical API-calling graph matching; malicious behavior detection; malware; security threat; Communication system security; Databases; Flow graphs; Functional programming; Information science; Libraries; National security; Programming profession; Switching systems; Systems engineering and theory;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Science and Engineering (ICISE), 2009 1st International Conference on
  • Conference_Location
    Nanjing
  • Print_ISBN
    978-1-4244-4909-5
  • Type

    conf

  • DOI
    10.1109/ICISE.2009.494
  • Filename
    5455762