DocumentCode :
2486781
Title :
Evasion-resistant malware signature based on profiling kernel data structure objects
Author :
Shosha, Ahmed F. ; Liu, Cong ; Gladyshev, Pavel ; Matten, M.
fYear :
2012
fDate :
10-12 Oct. 2012
Firstpage :
1
Lastpage :
8
Abstract :
Malware authors attempt in an endless effort to find new methods to evade the malware detection engines. A popular method is the use of obfuscation technologies that change the syntax of malicious code while preserving the execution semantics. This leads to the evasion of signatures that are built based on the code syntax. In this paper, we propose a novel approach to develop an evasion-resistant malware signature. This signature is based on the malware´s execution profiles extracted from kernel data structure objects and neither uses malicious code syntax specific information code execution flow information. Thus, proposed signature is more resistant to obfuscation methods and resilient in detecting malicious code variants. To evaluate the effectiveness of the proposed approach, a prototype signature generation tool called SigGENE is developed. The effectiveness of signatures generated by SigGENE evaluated using an experimental root kit-simulation tool that employs techniques commonly found in rootkits. This simulationtool is obfuscated using several different methods. In further experiments, real-world malware samples that have different variants with the same behavior used to verify the real-world applicability of the approach. The experiments show that the proposed approach is effective, not only in generating a signature that detects the malware and its variants and defeats different obfuscation methods, but also, in producing an execution profiles that can be used to characterize different malicious attacks.
Keywords :
data structures; digital signatures; invasive software; program compilers; SigGENE; code syntax; evasion-resistant malware signature; execution semantics; experimental root kit-simulation tool; kernel data structure objects profiling; malicious code; malicious code syntax specific information code execution flow information; malware authors; malware detection engines; malware execution profiles; obfuscation methods; obfuscation technologies; prototype signature generation tool; real-world applicability; real-world malware samples; Data structures; Feature extraction; Kernel; Malware; Monitoring; Robustness; Kernel Data Structure; Malware Behavior Profiling; Malware Signature; Signature-Based Detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on
Conference_Location :
Cork
Print_ISBN :
978-1-4673-3087-9
Electronic_ISBN :
978-1-4673-3088-6
Type :
conf
DOI :
10.1109/CRISIS.2012.6378949
Filename :
6378949
Link To Document :
بازگشت