Title :
Detecting malware variants via function-call graph similarity
Author :
Shang, Shanhu ; Zheng, Ning ; Xu, Jian ; Xu, Ming ; Zhang, Haiping
Author_Institution :
Inst. of Comput. Sci., Hangzhou Dianzi Univ., Hangzhou, China
Abstract :
Currently, signature-based malware scanning is still the dominant approach to identify malware samples in the wild due to its low false positive rate. However, this approach concentrates on programs´ specific instructions, and lacks insight into high level semantics; it is enduring challenges from advanced code obfuscation techniques such as polymorphism and metamorphism. To overcome this shortcoming, this paper extracts a program´s function-call graph as its signature. The paper presents a method to compute similarity between two binaries on basis of their function-call graph similarity. The proposed method relies on static analysis of a program, it first disassembles the program into assemble code, and then it uses a novel algorithm to construct the function-call graph from the assembly instructions. After that, it proposes a simple but effective graph matching method to compute similarity between two binaries. A prototype is implemented and evaluated on several well-known malware families and benign programs.
Keywords :
digital signatures; graph theory; invasive software; code obfuscation techniques; function call graph similarity; malware variants; signature based malware scanning; Decision support systems; Software;
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on
Conference_Location :
Nancy, Lorraine
Print_ISBN :
978-1-4244-9353-1
DOI :
10.1109/MALWARE.2010.5665787