DocumentCode :
3136305
Title :
A toolkit for detecting and analyzing malicious software
Author :
Weber, Michael ; Schmid, Matthew ; Schatz, Michael ; Geyer, David
Author_Institution :
Cigital Inc., Dulles, VA, USA
fYear :
2002
fDate :
2002
Firstpage :
423
Lastpage :
431
Abstract :
We present PEAT: the Portable Executable Analysis Toolkit. It is a software prototype designed to provide a selection of tools that an analyst may use in order to examine structural aspects of a Windows Portable Executable (PE) file, with the goal of determining whether malicious code has been inserted into an application after compilation. These tools rely on structural features of executables that are likely to indicate the presence of inserted malicious code. The underlying premise is that typical application programs are compiled into one binary, homogeneous from beginning to end with respect to certain structural features; any disruption of this homogeneity is a strong indicator that the binary has been tampered with. For example, it could now harbor a virus or a Trojan horse program. We present our investigation into structural feature analysis, the development of these ideas into the PEAT prototype, and results that illustrate PEAT´s practical effectiveness.
Keywords :
operating systems (computers); program verification; security of data; software portability; software tools; PEAT; Portable Executable Analysis Toolkit; Trojan horse; Windows Portable Executable file; computer virus; executables; malicious software detection toolkit; software prototype; structural feature analysis; Application software; Information systems; Invasive software; Programming profession; Prototypes; Software design; Software prototyping; Software tools; Space technology; Viruses (medical);
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2002. Proceedings. 18th Annual
ISSN :
1063-9527
Print_ISBN :
0-7695-1828-1
Type :
conf
DOI :
10.1109/CSAC.2002.1176314
Filename :
1176314
Link To Document :
بازگشت