Malware variant detection using similarity search over sets of control flow graphs


Autoria(s): Cesare, Silvio; Xiang, Yang
Contribuinte(s)

[Unknown]

Data(s)

01/01/2011

Resumo

Static detection of polymorphic malware variants plays an important role to improve system security. Control flow has shown to be an effective characteristic that represents polymorphic malware instances. In our research, we propose a similarity search of malware using novel distance metrics of malware signatures. We describe a malware signature by the set of control flow graphs the malware contains. We propose two approaches and use the first to perform pre-filtering. Firstly, we use a distance metric based on the distance between feature vectors. The feature vector is a decomposition of the set of graphs into either fixed size k-sub graphs, or q-gram strings of the high-level source after decompilation. We also propose a more effective but less computationally efficient distance metric based on the minimum matching distance. The minimum matching distance uses the string edit distances between programs' decompiled flow graphs, and the linear sum assignment problem to construct a minimum sum weight matching between two sets of graphs. We implement the distance metrics in a complete malware variant detection system. The evaluation shows that our approach is highly effective in terms of a limited false positive rate and our system detects more malware variants when compared to the detection rates of other algorithms.

Identificador

http://hdl.handle.net/10536/DRO/DU:30042195

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30042195/cesare-conftrustcom-evid-2011.pdf

http://dro.deakin.edu.au/eserv/DU:30042195/cesare-malwarevariant-2011.pdf

http://hdl.handle.net/10.1109/TrustCom.2011.26

Direitos

2011, IEEE

Palavras-Chave #computer security #malware classification #static analysis #control flow #structuring #decompilation
Tipo

Conference Paper