• DocumentCode
    480561
  • Title

    Exploring Malware Behaviors Based on Environment Constitution

  • Author

    Su, Purui ; Ying, Lingyun ; Feng, Dengguo

  • Author_Institution
    Inst. of Software, Chinese Acad. of Sci., Beijing, China
  • Volume
    1
  • fYear
    2008
  • fDate
    13-17 Dec. 2008
  • Firstpage
    320
  • Lastpage
    325
  • Abstract
    Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malware. We utilized environment constitution to create comprehensive reports on malware. This allowed us to extract common paths and identify what seems to be typical malware behavior. We likewise used static analysis to document interactions between malware and environment, after which, based on environment constitution, we dynamically triggered different path selections that we observed have been pursued by malware. Different malware inputs were generated based on the reverse analysis of path selection conditions, a method that allowed for the exploration of all possible malware paths, and thereby permitted us to generate a relatively comprehensive report for this study. The method also allowed us to filter invalid data that we were unable to identify in the earlier process. The method became even more helpful when we implemented vulnerability analysis among the different types of commercial software; here, a prototype of the system was set up, and we have finished experiments to evaluate the system. The result showed that the system could identify typical behaviors of malware without exploring all its possible paths.
  • Keywords
    invasive software; program diagnostics; dynamic analysis technique; environment constitution; malware behavior; reverse path selection condition analysis; static analysis; Computational intelligence; Constitution; Data mining; Filters; Information security; Internet; Monitoring; Prototypes; Software prototyping; Text analysis; Computing Environment Constitution; Malware Analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Security, 2008. CIS '08. International Conference on
  • Conference_Location
    Suzhou
  • Print_ISBN
    978-0-7695-3508-1
  • Type

    conf

  • DOI
    10.1109/CIS.2008.130
  • Filename
    4724666