Kontakt

Universität Oldenburg
Fakultät II – Department für Informatik
Abteilung Safety-Security-Interaction
26111 Oldenburg

Sekretariat

Ingrid Ahlhorn

+49 (0) 441 - 798 2426

I 11 0-014

Industriestrasse 11, 26121 Oldenburg

Nachrichten

Artikel im ACM TOPS Journal!

Der Artikel „Behavior Nets: Context-Aware Behavior Modeling for Code Injection-based Windows Malware” mit SSI-Beteiligung beim ACM TOPS Journal akzeptiert!

Der Artikel „Behavior Nets: Context-Aware Behavior Modeling for Code Injection-based Windows Malware” mit SSI-Beteiligung beim ACM TOPS Journal akzeptiert!

J. Starink, M. Huisman, A. Peter, und A. Continella, "Behavior Nets: Context-Aware Behavior Modeling for Code Injection-Based Windows Malware" ACM Transactions on Privacy and Security (TOPS), vol. 28, iss. 3.

Kurze Zusammenfassung (auf Englisch):

Despite significant effort put into research and development of defense mechanisms, new malware is continuously developed rapidly, making it still one of the major threats on the Internet. For malware to be successful, it is in the developer’s best interest to evade detection as long as possible. One method in achieving this is using Code Injection, where malicious code is injected into another benign process, making it do something it was not intended to do.

Automated detection and characterization of Code Injection is difficult. Many injection techniques depend solely on system calls that in isolation look benign and can easily be confused with other background system activity. There is therefore a need for models that can consider the context in which a single system event resides, such that relevant activity can be distinguished easily.

In previous work, we conducted the first systematic study on code injection to gain more insights into the different techniques available to malware developers on the Windows platform. This paper extends this work by introducing and formalizing Behavior Nets: A novel, reusable, context-aware modeling language that expresses malicious software behavior in observable events and their general interdependence. This allows for matching on system calls, even if those system calls are typically used in a benign context. We evaluate Behavior Nets and experimentally confirm that introducing event context into behavioral signatures yields better results in characterizing malicious behavior than the state of the art. We conclude with valuable insights on how future malware research based on dynamic analysis should be conducted.

(Stand: 20.08.2024)  Kurz-URL:Shortlink: https://uole.de/p87900n11953
Zum Seitananfang scrollen Scroll to the top of the page