Contact

University of Oldenburg Faculty II - Department of Computer Science Department Safety-Security-Interaction 26111 Oldenburg

Secretariat

Ingrid Ahlhorn

A03 2-208

+49 (0) 441 - 798 2426

News

Article in the ACM TOPS Journal!

SSI-co-authored paper „Behavior Nets: Context-Aware Behavior Modeling for Code Injection-based Windows Malware” accepted at the ACM TOPS journal!

SSI-co-authored paper „Behavior Nets: Context-Aware Behavior Modeling for Code Injection-based Windows Malware” accepted at the ACM TOPS journal!

J. Starink, M. Huisman, A. Peter, und A. Continella, "Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware" ACM Transactions on Privacy and Security (TOPS), vol. 28, iss. 3.

Short summary:

Despite significant effort put into research and development of defense mechanisms, new malware is continuously developed rapidly, making it still one of the major threats on the Internet. For malware to be successful, it is in the developer’s best interest to evade detection as long as possible. One method in achieving this is using Code Injection, where malicious code is injected into another benign process, making it do something it was not intended to do.

Automated detection and characterization of Code Injection is difficult. Many injection techniques depend solely on system calls that in isolation look benign and can easily be confused with other background system activity. There is therefore a need for models that can consider the context in which a single system event resides, such that relevant activity can be distinguished easily.

In previous work, we conducted the first systematic study on code injection to gain more insights into the different techniques available to malware developers on the Windows platform. This paper extends this work by introducing and formalizing Behavior Nets: A novel, reusable, context-aware modeling language that expresses malicious software behavior in observable events and their general interdependence. This allows for matching on system calls, even if those system calls are typically used in a benign context. We evaluate Behavior Nets and experimentally confirm that introducing event context into behavioral signatures yields better results in characterizing malicious behavior than the state of the art. We conclude with valuable insights on how future malware research based on dynamic analysis should be conducted.

(Changed: 20 Aug 2024)  Kurz-URL:Shortlink: https://uole.de/p87900n11953en
Zum Seitananfang scrollen Scroll to the top of the page