• DocumentCode
    669122
  • Title

    Synthesizing near-optimal malware specifications from suspicious behaviors

  • Author

    Jha, Somesh ; Fredrikson, Matthew ; Christodoresu, Mihai ; Sailer, Rudolf ; Xifeng Yan

  • fYear
    2013
  • fDate
    22-24 Oct. 2013
  • Firstpage
    41
  • Lastpage
    50
  • Abstract
    Behavior-based detection techniques are a promising solution to the problem of malware proliferation. However, they require precise specifications of malicious behavior that do not result in an excessive number of false alarms, while still remaining general enough to detect new variants before traditional signatures can be created and distributed. In this paper, we present an automatic technique for extracting optimally discriminative specifications, which uniquely identify a class of programs. Such a discriminative specification can be used by a behavior-based malware detector. Our technique, based on graph mining and stochastic optimization, scales to large classes of programs. When this work was originally published, the technique yielded favorable results on malware targeted towards workstations (~86% detection rates on new malware). We believe that it can be brought to bear on emerging malware-based threats for new platforms, and discuss several promising avenues for future work in this direction.
  • Keywords
    data mining; formal specification; graph theory; invasive software; stochastic programming; automatic optimally discriminative specification extraction technique; behavior-based malware detection techniques; discriminative specification; graph mining; malware proliferation problem; near-optimal malware specification synthesis; stochastic optimization; suspicious behavior detection rates; Algorithm design and analysis; Data mining; Detectors; Malware; Payloads; Software;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on
  • Conference_Location
    Fajardo, PR
  • Print_ISBN
    978-1-4799-2534-6
  • Type

    conf

  • DOI
    10.1109/MALWARE.2013.6703684
  • Filename
    6703684