Tracking memory writes for malware classification and code reuse identification

7Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malicious code (malware) is used to steal sensitive data, to attack corporate networks, and to deliver spam. To silently compromise systems and maintain their access, malware developers usually apply obfuscation techniques that result in a massive amount of malware variants and that can render static analysis approaches ineffective. To address the limitations of static approaches, researchers have proposed dynamic analysis systems. These systems usually rely on a sandboxing environment that captures the system calls performed by a program under analysis. In this paper, we propose a novel approach to capture and model malware behavior that is based on the monitoring of the data values that a certain subset of instructions writes to memory during program execution. We have implemented a malware clustering component and a component to detect code reuse between different malware families. To validate our proposed techniques, we analyzed 16,248 malware samples. We found that our techniques produce clusters with high accuracy, as well as interesting cases of code reuse among malicious programs. © 2013 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Grégio, A. R. A., De Geus, P. L., Kruegel, C., & Vigna, G. (2013). Tracking memory writes for malware classification and code reuse identification. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7591 LNCS, pp. 134–143). Springer Verlag. https://doi.org/10.1007/978-3-642-37300-8_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free