Abstract. This work is a weighted generalization of the abstraction based analysis tech-nique we previously proposed for the detection of high-level malware behaviors. Our ap-proach, using a rewriting-based abstraction mechanism, produces abstracted forms of program traces, independent of the program implementation. The suspicious behaviors to be recognized, defined as combinations of patterns given in a signature, are detected by model-checking on the high-level representation of the program. Introducing weights in this approach allows us to express a pertinence degree of detection when analysis of the program results in an incomplete or uncertain program dataflow, or when abstraction cannot be performed reliably.
We introduce a new representation for monitored behavior of malicious software called Malware Instru...
In this paper we describe the use of formal methods to model malware behaviour. The modelling of har...
We introduce a new representation for monitored behavior of malicious soft-ware called Malware Instr...
International audienceWe present an approach for proactive malware detection by working on an abstra...
Abstract. We present an approach for proactive malware detection working by abstraction of program b...
Abstract. We propose a formal approach for the detection of high-level malware behaviors. Our techni...
We present an approach for proactive malware detection by working on an abstract representation of a...
We propose a formal approach for behavioral analysis of programs based on dynamic analysis. It works...
We propose a formal approach for behavioral analysis of programs based on dynamic analysis. It works...
L’analyse comportementale traditionnelle opère en général au niveau de l’implantation de comportemen...
International audienceWe propose a formal approach for the detection of high-level malware behaviors...
Traditional behavior analysis usually operates at the implementation level of a malicious behavior. ...
A daily task of malware analysts is the extraction of behaviors from malicious binaries. Such behavi...
Malware detectors require a specification of malicious behav-ior. Typically, these specifications ar...
Traditional behavior analysis usually operates at the implementation level of malicious behaviors. Y...
We introduce a new representation for monitored behavior of malicious software called Malware Instru...
In this paper we describe the use of formal methods to model malware behaviour. The modelling of har...
We introduce a new representation for monitored behavior of malicious soft-ware called Malware Instr...
International audienceWe present an approach for proactive malware detection by working on an abstra...
Abstract. We present an approach for proactive malware detection working by abstraction of program b...
Abstract. We propose a formal approach for the detection of high-level malware behaviors. Our techni...
We present an approach for proactive malware detection by working on an abstract representation of a...
We propose a formal approach for behavioral analysis of programs based on dynamic analysis. It works...
We propose a formal approach for behavioral analysis of programs based on dynamic analysis. It works...
L’analyse comportementale traditionnelle opère en général au niveau de l’implantation de comportemen...
International audienceWe propose a formal approach for the detection of high-level malware behaviors...
Traditional behavior analysis usually operates at the implementation level of a malicious behavior. ...
A daily task of malware analysts is the extraction of behaviors from malicious binaries. Such behavi...
Malware detectors require a specification of malicious behav-ior. Typically, these specifications ar...
Traditional behavior analysis usually operates at the implementation level of malicious behaviors. Y...
We introduce a new representation for monitored behavior of malicious software called Malware Instru...
In this paper we describe the use of formal methods to model malware behaviour. The modelling of har...
We introduce a new representation for monitored behavior of malicious soft-ware called Malware Instr...