Malware Message Classification by Dynamic Analysis - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

Malware Message Classification by Dynamic Analysis

Résumé

The fact that new malware appear every day demands a strong response from anti-malware forces. For that sake, an analysis of new samples must be performed. Usually, one tries to replay the behavior of malware in a safe environment. However, some samples activate a malicious function only if they receive some particular inputs from its command and control server. The problem is then to get some grasp on the interactions between the malware and its environment. For that sake, we propose to work in four steps. First, we enumerate all possible execution path following the reception of a message. Second, we describe for all execution path the set of corresponding messages. Third, we build an automaton that discriminate types of runs given an arbitrary word. Finally, we unify some equivalent run, and simplify the underlying automaton.
Fichier non déposé

Dates et versions

hal-01099692 , version 1 (05-01-2015)

Identifiants

  • HAL Id : hal-01099692 , version 1

Citer

Guillaume Bonfante, Jean-Yves Marion, Thanh Dinh Ta. Malware Message Classification by Dynamic Analysis. The 7th International Symposium on Foundations and Practice of Security, Nov 2014, Montreal, Canada. pp.16. ⟨hal-01099692⟩
145 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More