DocumentCode
669122
Title
Synthesizing near-optimal malware specifications from suspicious behaviors
Author
Jha, Somesh ; Fredrikson, Matthew ; Christodoresu, Mihai ; Sailer, Rudolf ; Xifeng Yan
fYear
2013
fDate
22-24 Oct. 2013
Firstpage
41
Lastpage
50
Abstract
Behavior-based detection techniques are a promising solution to the problem of malware proliferation. However, they require precise specifications of malicious behavior that do not result in an excessive number of false alarms, while still remaining general enough to detect new variants before traditional signatures can be created and distributed. In this paper, we present an automatic technique for extracting optimally discriminative specifications, which uniquely identify a class of programs. Such a discriminative specification can be used by a behavior-based malware detector. Our technique, based on graph mining and stochastic optimization, scales to large classes of programs. When this work was originally published, the technique yielded favorable results on malware targeted towards workstations (~86% detection rates on new malware). We believe that it can be brought to bear on emerging malware-based threats for new platforms, and discuss several promising avenues for future work in this direction.
Keywords
data mining; formal specification; graph theory; invasive software; stochastic programming; automatic optimally discriminative specification extraction technique; behavior-based malware detection techniques; discriminative specification; graph mining; malware proliferation problem; near-optimal malware specification synthesis; stochastic optimization; suspicious behavior detection rates; Algorithm design and analysis; Data mining; Detectors; Malware; Payloads; Software;
fLanguage
English
Publisher
ieee
Conference_Titel
Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on
Conference_Location
Fajardo, PR
Print_ISBN
978-1-4799-2534-6
Type
conf
DOI
10.1109/MALWARE.2013.6703684
Filename
6703684
Link To Document