A tool for analyzing and detecting malicious mobile code

  • Authors:
  • Akira Mori;Tomonori Izumida;Toshimi Sawada;Tadashi Inoue

  • Affiliations:
  • National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan;National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan;SRA Key Technology Laboratory, Inc., Tokyo, Japan;SRA Key Technology Laboratory, Inc., Tokyo, Japan

  • Venue:
  • Proceedings of the 28th international conference on Software engineering
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a tool for analysis and detection of malicious mobile code such as computer viruses and internet worms based on the combined use of code simulation, static code analysis, and OS execution emulation. Unlike traditional anti-virus methods, the tool directly inspects the code and identifies commonly found malicious behaviors such as mass mailing, self duplication, and registry overwrite without relying on ``pattern files'' that contain ``signatures'' of previously captured samples. The prohibited behaviors are defined separately as security policies at the level of API library function calls in a state-transition like language. The tool also features data flow analysis based on static single assignment forms, which are useful in tracing various values stored in registers and memory locations. The current tool targets at Win32 binary programs on Intel IA32 architectures and can detect most email virusesslash worms that had spread in the wild in recent years.