Idea: opcode-sequence-based malware detection

  • Authors:
  • Igor Santos;Felix Brezo;Javier Nieves;Yoseba K. Penya;Borja Sanz;Carlos Laorden;Pablo G. Bringas

  • Affiliations:
  • S3 Lab;S3 Lab;S3 Lab;eNergy Lab, University of Deusto, Bilbao, Spain;S3 Lab;S3 Lab;S3 Lab

  • Venue:
  • ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malware is every malicious code that has the potential to harm any computer or network. The amount of malware is increasing faster every year and poses a serious security threat. Hence, malware detection has become a critical topic in computer security. Currently, signature-based detection is the most extended method within commercial antivirus. Although this method is still used on most popular commercial computer antivirus software, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new variations of known malware. In this paper, we propose a new method to detect variants of known malware families. This method is based on the frequency of appearance of opcode sequences. Furthermore, we describe a method to mine the relevance of each opcode and, thereby, weigh each opcode sequence frequency. We show that this method provides an effective way to detect variants of known malware families.