Semantics-aware malware detection

作者: M. Christodorescu , S. Jha , S.A. Seshia , D. Song , R.E. Bryant

DOI: 10.1109/SP.2005.20

关键词: Obfuscation (software)Overhead (computing)Computer wormCyber-collectionMalwareComputer virusSemantics (computer science)HackerComputer scienceObfuscationCryptovirologyComputer security

摘要: … In this paper, we present a malware… our malware-detection algorithm can detect variants of malware with a relatively low run-time overhead. Moreover, our semantics-aware malware …

参考文章(28)
David M. Chess, Steve R. White, An Undetectable Computer Virus ,(2000)
R. Power, CSI/FBI computer crime and security survey Computer Security Journal. ,vol. 17, pp. 20- 51 ,(2001)
Mihai Christodorescu, Somesh Jha, Static analysis of executables to detect malicious patterns usenix security symposium. pp. 12- 12 ,(2003) , 10.21236/ADA449067
Fredrik Valeur, Christopher Kruegel, Giovanni Vigna, William Robertson, Static disassembly of obfuscated binaries usenix security symposium. pp. 18- 18 ,(2004)
Fred Cohen, Computer viruses Computers & Security. ,vol. 6, pp. 22- 35 ,(1987) , 10.1016/0167-4048(87)90122-2
K. Ashcraft, D. Engler, Using programmer-written compiler extensions to catch security holes ieee symposium on security and privacy. pp. 143- 159 ,(2002) , 10.1109/SECPRI.2002.1004368
T. Jensen, D. Le Metayer, T. Thorn, Verification of control flow based security properties ieee symposium on security and privacy. pp. 89- 103 ,(1999) , 10.1109/SECPRI.1999.766902
Shuvendu K. Lahiri, Sanjit A. Seshia, The UCLID Decision Procedure Computer Aided Verification. pp. 475- 478 ,(2004) , 10.1007/978-3-540-27813-9_40
Mihai Christodorescu, Somesh Jha, Testing malware detectors international symposium on software testing and analysis. ,vol. 29, pp. 34- 44 ,(2004) , 10.1145/1007512.1007518
Gary McGraw, Greg Morrisett, Attacking Malicious Code: A Report to the Infosec Research Council IEEE Software. ,vol. 17, pp. 33- 41 ,(2000) , 10.1109/52.877857