Malware Behavioral Detection by Attribute-Automata Using Abstraction from Platform and Language

  • Authors:
  • Grégoire Jacob;Hervé Debar;Eric Filiol

  • Affiliations:
  • France Télécom R&D, Caen, France and Operational Virology and Cryptology Lab., ESIEA Laval, France;France Télécom R&D, Caen, France;Operational Virology and Cryptology Lab., ESIEA Laval, France

  • Venue:
  • RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Most behavioral detectors of malware remain specific to a given language and platform, mostly executables for Windows. The objective of this paper is to define a generic approach for behavioral detection based on two layers respectively responsible for abstraction and detection. The abstraction layer is specific to a platform and a language. It interprets the collected instructions, API calls and arguments and classifies these operations, as well as the objects involved, according to their purpose in the malware lifecycle. The detection layer remains generic and interoperable with different abstraction components. It relies on parallel automata parsing attribute-grammars where semantic rules are used for object typing (object classification) and object binding (data-flow). Theoretical results are first given with respect to the grammatical constraints weighting on the signature construction as well as to the resulting complexity of the detection. For experimentation purposes, two abstraction components have then been developed: one processing system call traces and the other processing the VBScript interpreted language. Experimentations have provided promising detection rates, in particular for scripts (89%), with almost no false positives. In the case of process traces, the detection rate remains significant (51%) but could be increased by sophisticated collection tools.