Metamorphic malware detection using LLVM IR and hidden Markov model

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper proposes a new method to detect metamorphic malware with the help of hidden Markov model and LLVM intermediate representation. The new approach improves the accuracy of HMM by simplifying various uncertain transformations present in the metamorphic code with the help of conversion of these instructions into the LLVM IR. Due to conversion of the unstructured assembly language code into the simplified LLVM IR, many of the code obfuscations are reversed and thus simplified form of instructions are generated. We can easily detect the remaining transformations or other unknown probabilistic states which HMM undergoes. Conversion to LLVM IR increases the predictability of HMM and also the probability to successfully detect other hidden states of malwares. Hence, this approach to first convert code into IR and then test the IR on HMM increases the probability of successful detection of metamorphic malwares.

Cite

CITATION STYLE

APA

Mahajan, G., & Raja. (2016). Metamorphic malware detection using LLVM IR and hidden Markov model. In Advances in Intelligent Systems and Computing (Vol. 438, pp. 411–421). Springer Verlag. https://doi.org/10.1007/978-981-10-0767-5_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free