Detecting machine-morphed malware variants via engine attribution

  • Authors:
  • Radhouane Chouchane;Natalia Stakhanova;Andrew Walenstein;Arun Lakhotia

  • Affiliations:
  • CCT 430, Columbus State University, Columbus, USA 31907;University of New Brunswick, Fredericton, Canada;University of Louisiana at Lafayette, Lafayette, USA;University of Louisiana at Lafayette, Lafayette, USA

  • Venue:
  • Journal in Computer Virology
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

One method malware authors use to defeat detection of their programs is to use morphing engines to rapidly generate a large number of variants. Inspired by previous works in author attribution of natural language text, we investigate a problem of attributing a malware to a morphing engine. Specifically, we present the malware engine attribution problem and formally define its three variations: MVRP, DENSITY and GEN, that reflect the challenges malware analysts face nowadays. We design and implement heuristics to address these problems and show their effectiveness on a set of well-known malware morphing engines and a real-world malware collection reaching detection accuracies of 96 % and higher. Our experiments confirm the applicability of the proposed approach in practice and indicate that engine attribution may offer a viable enhancement of current defenses against malware.