- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources3
- Resource Type
-
0000000003000000
- More
- Availability
-
30
- Author / Contributor
- Filter by Author / Creator
-
-
Liu, Peng (2)
-
Cao, Fu-Qiang (1)
-
Chen, Li-Hua (1)
-
Chen, Yin-Ji (1)
-
Cui, Bao-Qun (1)
-
Guo, Bing (1)
-
He, Jian-Jun (1)
-
Heger, Alexander (1)
-
Hoveyda, Amir H (1)
-
Jiang, Xin-Zhi (1)
-
Kahl, David (1)
-
Kobayashi, Haruki (1)
-
Lan, Pengwei (1)
-
Li, Er-Tao (1)
-
Li, Jia-Qing (1)
-
Li, Xin-Yue (1)
-
Li, Zhi-Hong (1)
-
Li, Zi-Ming (1)
-
Lian, Gang (1)
-
Liu, Qinghe (1)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Chen, Yin-Ji; Zhang, Hao; Zhang, Li-Yong; He, Jian-Jun; deBoer, Richard James; Wiescher, Michael; Heger, Alexander; Kahl, David; Su, Jun; Odell, Daniel; et al (, Nuclear Science and Techniques)
-
Ming, Jiang; Xin, Zhi; Lan, Pengwei; Wu, Dinghao; Liu, Peng; Mao, Bing (, Journal of computer virology and hacking techniques)As the underground market of malware flourishes, there is an exponential increase in the number and diversity of malware. A crucial question in malware analysis research is how to define malware specifications or signatures that faithfully describe similar malicious intent and also clearly stand out from other programs. Although the traditional malware specifications based on syntactic signatures are efficient, they can be easily defeated by various obfuscation techniques. Since the malicious behavior is often stable across similar malware instances, behavior-based specifications which capture real malicious characteristics during run time, have become more prevalent in anti-malware tasks, such as malware detection and malware clustering. This kind of specification is typically extracted from the system call dependence graph that a malware sample invokes. In this paper, we present replacement attacks to cam- ouflage similar behaviors by poisoning behavior-based specifications. The key method of our attacks is to replace a system call dependence graph to its semantically equivalent variants so that the similar malware samples within one family turn out to be different. As a result, malware analysts have to put more efforts into reexamining the similar samples which may have been investigated before. We distil general attacking strategies by mining more than 5, 200 malware samples’ behavior specifications and implement a compiler-level prototype to automate replacement attacks. Experiments on 960 real malware samples demonstrate the effectiveness of our approach to impede various behavior-based mal- ware analysis tasks, such as similarity comparison and malware clustering. In the end, we also discuss possible countermeasures in order to strengthen existing mal- ware defense.more » « less
An official website of the United States government

Full Text Available