Poster: Detecting malware through temporal function-based features

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations

    Abstract

    In order to evade detection by anti-virus software, malware writers use techniques, such as polymorphism, metamorphism and code re-writing. The result is that such malware contain a much larger fraction of "new" code, compared to benign programs, which tend to maximize code reuse. In this research we study this interesting property and show that by performing "archaeological" analysis of functions residing within binary files (i.e., estimating the functions' creation date), a new set of informative features can be derived. We show that these features provide a good indication for the existence of malicious code within binary files. Preliminary experiments of the proposed temporal function-based features with a set of over 12,000 files indicates that the proposed set of features can be useful for the detection of malicious files (accuracy of over 90% and AUC of 0.96).

    Original languageEnglish
    Title of host publicationCCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security
    Pages1379-1381
    Number of pages3
    DOIs
    StatePublished - 9 Dec 2013
    Event2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013 - Berlin, Germany
    Duration: 4 Nov 20138 Nov 2013

    Publication series

    NameProceedings of the ACM Conference on Computer and Communications Security
    ISSN (Print)1543-7221

    Conference

    Conference2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013
    Country/TerritoryGermany
    CityBerlin
    Period4/11/138/11/13

    Keywords

    • machine learning
    • malware detection
    • static analysis

    ASJC Scopus subject areas

    • Software
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Poster: Detecting malware through temporal function-based features'. Together they form a unique fingerprint.

    Cite this