Title :
Detection of malicious code in user mode
Author_Institution :
Dept. of CSE, Arunai Engineeing Coll., Thiruvannamalai, India
Abstract :
A particular type of executable malware code is malicious code that harms the computer or networks without the user intervention. Static analysis is used to identify the location of system calls from service request and monitor the executables at runtime, but difficult to determine the obfuscated code because code uses dynamic code generation and obfuscation techniques. This technique hides the win32 API calls at runtime. Malicious code can interact with operating system through Win32 API usage. Malicious executables can hide their win32 API usage during Static analysis. Our proposed approach is used to distinguish the software executables and analyze the virtual address and API names of instructions from system calls are recorded to match with the interrupt address table. The recorded instructions are found in Address table, the services are forwarded to kernel mode. Filter is mainly focus on separating the address belongs to its local id and remote id for validating the dispatch id in system service dispatch table. Through filter using the process creation algorithm to finalize it service request from legitimate user. The overall processing is done by user mode before the injected code entering into the kernel mode.
Keywords :
application program interfaces; invasive software; program diagnostics; dynamic code generation; executable malware code; interrupt address table; obfuscated code; obfuscation techniques; service request; software executables; static analysis; system service dispatch table; user mode; win32 API; Kernel; Malware; Matched filters; Monitoring; Runtime; Malicious code; static analysis; system call;
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2013 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4673-5786-9
DOI :
10.1109/ICICES.2013.6508244