MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API

  • Authors:
  • Vinod P. Nair;Harshit Jain;Yashwant K. Golecha;Manoj Singh Gaur;Vijay Laxmi

  • Affiliations:
  • Malaviya National Institute of Technology, Jaipur, India;Malaviya National Institute of Technology, Jaipur, India;Malaviya National Institute of Technology, Jaipur, India;Malaviya National Institute of Technology, Jaipur, India;Malaviya National Institute of Technology, Jaipur, India

  • Venue:
  • Proceedings of the 3rd international conference on Security of information and networks
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malware detection and prevention methods are increasingly becoming necessary for computer systems connected to the Internet. The traditional signature based detection of malware fails for metamorphic malware which changes its code structurally while maintaining functionality at time of propagation. This category of malware is called metamorphic malware. In this paper we dynamically analyze the executables produced from various metamorphic generators through an emulator by tracing API calls. A signature is generated for an entire malware class (each class representing a family of viruses generated from one metamorphic generator) instead of for individual malware sample. We show that most of the metamorphic viruses of same family are detected by the same base signature. Once a base signature for a particular metamorphic generator is generated, all the metamorphic viruses created from that tool are easily detected by the proposed method. A Proximity Index between the various Metamorphic generators has been proposed to determine how similar two or more generators are.