Title :
Towards Efficient Analysis for Malware in the Wild
Author :
Iwamura, Makoto ; Itoh, Mitsutaka ; Muraoka, Yoichi
Author_Institution :
NTT Inf. Sharing Platform Labs., Musashino, Japan
Abstract :
We propose two novel techniques for reducing the workload for malware analysis. The first technique is restricted instruction, which accelerates finding the longest common subsequence (LCS) between machine code instruction sequences of malware. The second technique is probabilistic disassembly, which can find the most probable disassembly result of a binary stream without a clue, such as debug symbols or the information of import functions. By combining the two proposals and our generic unpacker, we built an automatic malware classification system. Given an unknown malware program, the system enables malware analysts to find the most similar known malware program to this unknown one, and even estimate different/common instructions. In one of our experiments, we classified 3,233 malware samples in the wild and concluded that 75% of the samples belong to the seven largest clusters. As a result, only seven samples, one from each cluster, were required to be analyzed in order to reveal the functionality of the rest of the 75%, showing a great increase in efficiency of analysis.
Keywords :
invasive software; program diagnostics; reverse engineering; automatic malware classification system; binary stream; debug symbol; import function; longest common subsequence; machine code instruction sequence; malware analysis; malware program; probabilistic disassembly; Engines; Hidden Markov models; IEEE Communications Society; Malware; Monitoring; Probabilistic logic; Topology;
Conference_Titel :
Communications (ICC), 2011 IEEE International Conference on
Conference_Location :
Kyoto
Print_ISBN :
978-1-61284-232-5
Electronic_ISBN :
1550-3607
DOI :
10.1109/icc.2011.5963469