TY - GEN
T1 - Poster
T2 - 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013
AU - Menahem, Eitan
AU - Shabtai, Asaf
AU - Levhar, Adi
PY - 2013/12/9
Y1 - 2013/12/9
N2 - In order to evade detection by anti-virus software, malware writers use techniques, such as polymorphism, metamorphism and code re-writing. The result is that such malware contain a much larger fraction of "new" code, compared to benign programs, which tend to maximize code reuse. In this research we study this interesting property and show that by performing "archaeological" analysis of functions residing within binary files (i.e., estimating the functions' creation date), a new set of informative features can be derived. We show that these features provide a good indication for the existence of malicious code within binary files. Preliminary experiments of the proposed temporal function-based features with a set of over 12,000 files indicates that the proposed set of features can be useful for the detection of malicious files (accuracy of over 90% and AUC of 0.96).
AB - In order to evade detection by anti-virus software, malware writers use techniques, such as polymorphism, metamorphism and code re-writing. The result is that such malware contain a much larger fraction of "new" code, compared to benign programs, which tend to maximize code reuse. In this research we study this interesting property and show that by performing "archaeological" analysis of functions residing within binary files (i.e., estimating the functions' creation date), a new set of informative features can be derived. We show that these features provide a good indication for the existence of malicious code within binary files. Preliminary experiments of the proposed temporal function-based features with a set of over 12,000 files indicates that the proposed set of features can be useful for the detection of malicious files (accuracy of over 90% and AUC of 0.96).
KW - machine learning
KW - malware detection
KW - static analysis
UR - http://www.scopus.com/inward/record.url?scp=84889035083&partnerID=8YFLogxK
U2 - https://doi.org/10.1145/2508859.2512505
DO - https://doi.org/10.1145/2508859.2512505
M3 - Conference contribution
SN - 9781450324779
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 1379
EP - 1381
BT - CCS 2013 - Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security
Y2 - 4 November 2013 through 8 November 2013
ER -