• DocumentCode
    1968179
  • Title

    Disassembled code analyzer for malware (DCAM)

  • Author

    Sulaiman, A. ; Ramamoorthy, K. ; Mukkamala, S. ; Sung, A.H.

  • Author_Institution
    Dept. of Comput. Sci., New Mexico Tech., NM, USA
  • fYear
    2005
  • fDate
    15-17 Aug. 2005
  • Firstpage
    398
  • Lastpage
    403
  • Abstract
    Current static malware detection techniques have serious limitations. Little modifications can result in a new strand of malware that escapes. In this paper, we present a static detection technique using disassembly of a malware emphasizing the recognition of variants of a malware in its signature set. The hypothesis is that all variants share a common core signature that is a combination of several features of the code. In addition to malware, spyware and adware are also analyzed to find the similar features. A previously identified malware can be analyzed to extract the signature, which will then be used to recognize its variants. Since this technique uses disassembled code, it can be used on any operating system. Encouraging experimental results on a set of malware are presented. Since the existence of spyware and adware is increasing, an analysis on how this technique can be extended to detect spyware is also presented.
  • Keywords
    digital signatures; invasive software; adware; disassembled code analyzer for malware; malware detection techniques; spyware; Assembly; Computer science; Computer worms; Control systems; Internet; Law; Legal factors; Operating systems; Payloads; Viruses (medical);
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Reuse and Integration, Conf, 2005. IRI -2005 IEEE International Conference on.
  • Print_ISBN
    0-7803-9093-8
  • Type

    conf

  • DOI
    10.1109/IRI-05.2005.1506506
  • Filename
    1506506