• DocumentCode
    2963289
  • Title

    Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File

  • Author

    Kim, Daewon ; Kim, Ikkyun ; Oh, Jintae ; Jang, Jongsoo

  • Author_Institution
    Knowledge-based Inf. Security & Safely Res. Dept., Electron. & Telecommun. Res. Inst., Daejeon, South Korea
  • fYear
    2010
  • fDate
    20-25 Sept. 2010
  • Firstpage
    152
  • Lastpage
    156
  • Abstract
    In computing environments, the core of various security threats is malicious executable files. Conventional signature-based security systems are difficult to detect, at run-time, the unknowns among malicious executable files. For the reason, the static and dynamic analysis methods that the signatures are not required have been actively researched for run-time detection of the unknowns. In particular, the behavior-based dynamic analysis methods which monitor the action statuses, after the actual running of malicious executable file, have made a worthy contribution for the accuracy enhancement of analysis result. However, the analysis information which is offered by most behavior-based methods is not sufficient for applying the results to the methods which finally decide the malignancy of executable file because each behavior-based methods offer only the results of a few action or non-sequential analysis. In this paper, we classified the activities that may be occurred during the execution of malicious executable files and described the implementation of prototype program which can monitor the activities. Additionally, based on operation results of the prototype program, we discussed some important issues which are occurred due to the differences of real and virtual experimental environments.
  • Keywords
    digital signatures; invasive software; program diagnostics; behavior-based dynamic analysis; behavior-based tracer; computing environment; malicious executable file; malicious feature monitoring; malware analysis; nonsequential analysis; run-time detection; security threat; signature-based security system; static analysis; unknown executable file; Grippers; Kernel; Malware; Monitoring; Prototypes; Virtual machining; behavior-based analysis; dynamic analysis; malware analysis; unknown attack analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing in the Global Information Technology (ICCGI), 2010 Fifth International Multi-Conference on
  • Conference_Location
    Valencia
  • Print_ISBN
    978-1-4244-8068-5
  • Electronic_ISBN
    978-0-7695-4181-5
  • Type

    conf

  • DOI
    10.1109/ICCGI.2010.29
  • Filename
    5628822