An evaluation of API calls hooking performance


Autoria(s): Marhusin, Mohd Fadzli; Larkin, Henry; Lokan, Chris; Cornforth, David
Contribuinte(s)

[Unknown]

Data(s)

01/01/2008

Resumo

An open research question in malware detection is how to accurately and reliably distinguish a malware program from a benign one, running on the same machine. In contrast to code signatures, which are commonly used in commercial protection software, signatures derived from system calls have the potential to form the basis of a much more flexible defense mechanism. However, the performance degradation caused by monitoring systems calls could adversely impact the machine. In this paper we report our experimental experience in implementing API hooking to capture sequences of API calls. The loading time often common programs was benchmarked with three different settings: plain, computer with antivirus and computer with API hook. Results suggest that the performance of this technique is sufficient to provide a viable approach to distinguishing between benign and malware code execution

Identificador

http://hdl.handle.net/10536/DRO/DU:30063699

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30063699/larkin-evaluationAPI-2008.pdf

http://dx.doi.org/10.1109/CIS.2008.199

Direitos

2008, IEEE

Palavras-Chave #artificial intelligence #computer security #security #information technology
Tipo

Conference Paper