• DocumentCode
    589789
  • Title

    Dynamic malware detection using registers values set analysis

  • Author

    Ghiasi, Mohaddeseh ; Sami, Ashkan ; Salehi, Z.

  • Author_Institution
    CSE & IT Dept., Shiraz Univ., Shiraz, Iran
  • fYear
    2012
  • fDate
    13-14 Sept. 2012
  • Firstpage
    54
  • Lastpage
    59
  • Abstract
    The number of Malicious files increase every day because of existing open source malware and obfuscation techniques. It means that traditional signature-based techniques are not adequate for detecting new variant of malware. Researchers and anti malware companies recently focus on more advanced protection which needs influential pattern extraction techniques. In this paper, a novel method is proposed based on similarities of binaries behaviors. At first, Run-time behavior of the binary files are found and logged in a controlled environment tool which is developed in-house. The approach assumes that behavior of each binary can be represented by the values of memory contents in its run-time. That is, values stored in different registers while the malware is running in the controlled environment can be a distinguishing factor to set it apart from those of benign programs. Then, the register values for each Application Programming Interface (API) call are extracted before and after API is invoked. After that, we traced the distribution and changes of registers values throughout the executable file and created a vector for each of the values of EAX, EBX, EDX, EDI, ESI and EBP registers. With comparing the similarity measures between old and unseen malware vectors, we detected 98% of unseen samples and with 2.9% false positive.
  • Keywords
    application program interfaces; digital signatures; invasive software; public domain software; API registers; EAX registers; EBP registers; EBX registers; EDI registers; EDX registers; ESI registers; antimalware companies; application programming interface; benign programs; binary files; controlled environment tool; dynamic malware detection; malicious files; obfuscation techniques; open source malware; pattern extraction techniques; registers values set analysis; signature-based techniques; Accuracy; Data mining; Feature extraction; Indexes; Malware; Monitoring; Registers; API Call; Dynamic Analysis; Malware Detection; Memory Content; Register Value;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
  • Conference_Location
    Tabriz
  • Print_ISBN
    978-1-4673-2387-1
  • Type

    conf

  • DOI
    10.1109/ISCISC.2012.6408191
  • Filename
    6408191