@inproceedings{56592111a45944f8b862827369f1ed4e,
title = "Poster: Detecting malware through temporal function-based features",
abstract = "In order to evade detection by anti-virus software, malware writers use techniques, such as polymorphism, metamorphism and code re-writing. The result is that such malware contain a much larger fraction of {"}new{"} code, compared to benign programs, which tend to maximize code reuse. In this research we study this interesting property and show that by performing {"}archaeological{"} analysis of functions residing within binary files (i.e., estimating the functions' creation date), a new set of informative features can be derived. We show that these features provide a good indication for the existence of malicious code within binary files. Preliminary experiments of the proposed temporal function-based features with a set of over 12,000 files indicates that the proposed set of features can be useful for the detection of malicious files (accuracy of over 90% and AUC of 0.96).",
keywords = "machine learning, malware detection, static analysis",
author = "Eitan Menahem and Asaf Shabtai and Adi Levhar",
year = "2013",
month = dec,
day = "9",
doi = "https://doi.org/10.1145/2508859.2512505",
language = "American English",
isbn = "9781450324779",
series = "Proceedings of the ACM Conference on Computer and Communications Security",
pages = "1379--1381",
booktitle = "CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security",
note = "2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013 ; Conference date: 04-11-2013 Through 08-11-2013",
}