Using clone detection to find malware in acrobat files

  • Authors:
  • Saruhan Karademir;Thomas Dean;Sylvain Leblanc

  • Affiliations:
  • Queen's University at Kingston;Queen's University at Kingston;Royal Military College of Canada

  • Venue:
  • CASCON '13 Proceedings of the 2013 Conference of the Center for Advanced Studies on Collaborative Research
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

One common vector of malware is JavaScript in Adobe Acrobat(PDF) files. In this paper, we investigate using near miss clone detectors to find the malware. We start by collecting a set of PDF files containing JavaScript malware and a set with clean JavaScript from the VirusTotal repository. We use the NiCad clone detector to find the classes of clones in a small subset of the malicious PDF files. We evaluate how clone classes can be used to find similar malicious files in the rest of the malicious collection while avoiding files in the benign collection. Our results show that a small training set produced 87% detection of previously known malware with 1% false positives.