DocumentCode
480561
Title
Exploring Malware Behaviors Based on Environment Constitution
Author
Su, Purui ; Ying, Lingyun ; Feng, Dengguo
Author_Institution
Inst. of Software, Chinese Acad. of Sci., Beijing, China
Volume
1
fYear
2008
fDate
13-17 Dec. 2008
Firstpage
320
Lastpage
325
Abstract
Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malware. We utilized environment constitution to create comprehensive reports on malware. This allowed us to extract common paths and identify what seems to be typical malware behavior. We likewise used static analysis to document interactions between malware and environment, after which, based on environment constitution, we dynamically triggered different path selections that we observed have been pursued by malware. Different malware inputs were generated based on the reverse analysis of path selection conditions, a method that allowed for the exploration of all possible malware paths, and thereby permitted us to generate a relatively comprehensive report for this study. The method also allowed us to filter invalid data that we were unable to identify in the earlier process. The method became even more helpful when we implemented vulnerability analysis among the different types of commercial software; here, a prototype of the system was set up, and we have finished experiments to evaluate the system. The result showed that the system could identify typical behaviors of malware without exploring all its possible paths.
Keywords
invasive software; program diagnostics; dynamic analysis technique; environment constitution; malware behavior; reverse path selection condition analysis; static analysis; Computational intelligence; Constitution; Data mining; Filters; Information security; Internet; Monitoring; Prototypes; Software prototyping; Text analysis; Computing Environment Constitution; Malware Analysis;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Security, 2008. CIS '08. International Conference on
Conference_Location
Suzhou
Print_ISBN
978-0-7695-3508-1
Type
conf
DOI
10.1109/CIS.2008.130
Filename
4724666
Link To Document