Malware Detection Based on Suspicious Behavior Identification

  • Authors:
  • Cheng Wang;Jianmin Pang;Rongcai Zhao;Wen Fu;Xiaoxian Liu

  • Affiliations:
  • -;-;-;-;-

  • Venue:
  • ETCS '09 Proceedings of the 2009 First International Workshop on Education Technology and Computer Science - Volume 02
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Along with the popularization of computers, especially the wide use of Internet, malicious code in recent years has presented a serious threat to our world. In this paper, through the analysis against the suspicious behaviors of vicious program by function calls, we present an approach of malware detection which is based on analysis and distilling of representative characteristic and systemic description of the suspicious behaviors indicated by the sequences of APIs called under Windows. Based on function calls and control flow analysis, according to the identification of suspicious behavior, the technique implements a strategy of detection from malicious binary executables.