Detecting malware through anti-analysis signals - A preliminary study

3Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malware is often designed to make analysis difficult – behaving differently if it detects that it is in an analysis environment. We propose that such anti-analysis malware can be detected by their antianalysis behavior in terms of certain signals. Signals form semantic features of potential anti-analysis techniques and are characterized as: weak, strong, or composite. We prototype a system to show the viability of detection. Experiments on malware and also non-malware show that both malware and non-malware can exhibit signals, however, antianalysis malware tends to have more and stronger signals. We present the malware with an environment which behaves either like an analysis environment or not – we find anti-analysis malware behave differently in both cases. Normal programs, however, do not exhibit such behavior even when they have some weak signals. Signal detection is shown to have potential of distinguishing anti-analysis malware from non-malware.

Cite

CITATION STYLE

APA

Tan, J. W. J., & Yap, R. H. C. (2016). Detecting malware through anti-analysis signals - A preliminary study. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10052 LNCS, pp. 542–551). Springer Verlag. https://doi.org/10.1007/978-3-319-48965-0_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free