Malicious code detection model based on behavior association

6Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals' sensitive information, company and government intellectual property, and to gain remote control of systems. However, traditional methods of malicious code detection, such as signature detection, behavior detection, virtual machine detection, and heuristic detection, have various weaknesses which make them unreliable. This paper presents the existing technologies of malicious code detection and a malicious code detection model is proposed based on behavior association. The behavior points of malicious code are first extracted through API monitoring technology and integrated into the behavior; then a relation between behaviors is established according to data dependence. Next, a behavior association model is built up and a discrimination method is put forth using pushdown automation. Finally, the exact malicious code is taken as a sample to carry out an experiment on the behavior's capture, association, and discrimination, thus proving that the theoretical model is viable.

Cite

CITATION STYLE

APA

Han, L., Qian, M., Xu, X., Fu, C., & Kwisaba, H. (2014). Malicious code detection model based on behavior association. Tsinghua Science and Technology, 19(5), 508–515. https://doi.org/10.1109/TST.2014.6919827

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free