Malware detection using assembly code and control flow graph optimization

  • Authors:
  • S. S. Anju;P. Harmya;Noopa Jagadeesh;R. Darsana

  • Affiliations:
  • Amrita Vishwa Vidyapeetham, Tamil Nadu, India;Amrita Vishwa Vidyapeetham, Tamil Nadu, India;Amrita Vishwa Vidyapeetham, Tamil Nadu, India;Amrita Vishwa Vidyapeetham, Tamil Nadu, India

  • Venue:
  • Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malware detection is a crucial aspect of software security. A malware detector is a system that attempts to determine whether a program has malicious intent. Current malware detectors work by checking for signatures, which attempt to capture the syntactic characteristics of the machine level byte sequence of the malware. This syntactic approach makes current detectors vulnerable to code obfuscations, increasingly used by malware writers that alter the syntactic properties of the malware byte sequence without significantly affecting their execution behavior. This paper derives from the idea that the key to malware identification lies in their syntactic as well as semantic features. It explains an approach using control flow graphs (CFG) for malware detectors. We present an architecture for detecting malicious patterns in executables that is resilient to common obfuscation transformations.