Behavior abstraction in malware analysis

  • Authors:
  • Philippe Beaucamps;Isabelle Gnaedig;Jean-Yves Marion

  • Affiliations:
  • INPL, INRIA Nancy Grand Est, Nancy-Université, LORIA, Vandoeuvre-lès-Nancy Cedex, France;INPL, INRIA Nancy Grand Est, Nancy-Université, LORIA, Vandoeuvre-lès-Nancy Cedex, France;INPL, INRIA Nancy Grand Est, Nancy-Université, LORIA, Vandoeuvre-lès-Nancy Cedex, France

  • Venue:
  • RV'10 Proceedings of the First international conference on Runtime verification
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present an approach for proactive malware detection working by abstraction of program behaviors. Our technique consists in abstracting program traces, by rewriting given subtraces into abstract symbols representing their functionality. Traces are captured dynamically by code instrumentation, which allows us to handle packed or self-modifying malware. Suspicious behaviors are detected by comparing trace abstractions to reference malicious behaviors. The expressive power of abstraction allows us to handle general suspicious behaviors rather than specific malware code and then, to detect malware mutations. We present and discuss an implementation validating our approach.