首页 | 本学科首页   官方微博 | 高级检索  
     


Metamorphic malware identification using engine-specific patterns based on co-opcode graphs
Affiliation:1. Istanbul Commerce University, Computer Engineering, Kucukyali, Istanbul, Turkey;2. Gebze Technical University, Computer Engineering, Gebze, Kocaeli, Turkey;1. Istanbul Commerce University, Computer Engineering, Kucukyali, Istanbul, Turkey;2. Gebze Technical University, Computer Engineering, Gebze, Kocaeli, Turkey;1. School of Information Science and Engineering, Xinjiang University, Urumqi, 830001, Xinjiang, China;2. Network Center, Xinjiang University, Urumqi, 830001, Xinjiang, China;3. School of Software, Xinjiang University, Urumqi, 830001, Xinjiang, China
Abstract:A metamorphic virus is a type of malware that modifies its code using a morphing engine. Morphing engines are used to generate a large number of metamorphic malware variants by performing different obfuscation techniques. Since each metamorphic malware has its own unique structure, signature based anti-virus programs are ineffective to detect these metamorphic variants. Therefore, detection of these kind of viruses becomes an increasingly important task. Recently, many researchers have focused on extracting common patterns of metamorphic variants that can be used as micro-signatures to identify the metamorphic malware executables. With the similar motivation, in this work, we propose a novel metamorphic malware identification method, named HLES-MMI (Higher-level Engine Signature based Metamorphic Malware Identification). The proposed method firstly constructs a unique graph structure, called as co-opcode graph, for each metamorphic family, then extracts engine-specific opcode patterns from the graphs. Finally, it generates higher-level signature belonging to each family by representing the extracted opcode-patterns with a binary vector. Experimental results on four datasets produced by different morphing engines demonstrate the effectiveness and efficiency of the proposed method by comparing with several existing malware identification methods.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号