In this paper, we propose a methodology, based on machine learning, for building a symbolic finite state automata based model of infected systems, that expresses the interaction between the malware and the environment by combining in the same model the code and the semantics of a system and allowing to tune both the system and the malware code observation. Moreover, we show that this methodology may have several applications in the context of malware detection
Symbolic finite automata (SFA) allow the representation of regular languages of strings over an infi...
Metamorphic malware apply semantics-preserving transformations to their own code in order to foil de...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...
In this thesis, we study algorithms which can be used to extract, or learn, formal mathematical mode...
Abstract. The underground malware-based economy is flourishing and it is ev-ident that the classical...
This thesis is devoted to the modeling of malicious behaviors inside malevolent codes, commonly call...
A behavior model of a program captures the correct ways of invoking its Application Programming Inte...
Malware analysis techniques are divided into static and dy- namic analysis. Both techniques can be b...
Abstract. A call for formalizing digital forensic investigations has been proposed by academics and ...
Metamorphic malware continuously modify their code, while preserving their functionality, in order t...
International audienceIn the field of malware detection, method based on syntactical consideration a...
peer-reviewedA call for formalizing digital forensic investigations has been proposed by academics ...
International audienceMost of malware detectors are based on syntactic signatures that identify know...
The manual methods to create detection rules are no longer prac- tical in the anti-malware product s...
We present an approach for proactive malware detection by working on an abstract representation of a...
Symbolic finite automata (SFA) allow the representation of regular languages of strings over an infi...
Metamorphic malware apply semantics-preserving transformations to their own code in order to foil de...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...
In this thesis, we study algorithms which can be used to extract, or learn, formal mathematical mode...
Abstract. The underground malware-based economy is flourishing and it is ev-ident that the classical...
This thesis is devoted to the modeling of malicious behaviors inside malevolent codes, commonly call...
A behavior model of a program captures the correct ways of invoking its Application Programming Inte...
Malware analysis techniques are divided into static and dy- namic analysis. Both techniques can be b...
Abstract. A call for formalizing digital forensic investigations has been proposed by academics and ...
Metamorphic malware continuously modify their code, while preserving their functionality, in order t...
International audienceIn the field of malware detection, method based on syntactical consideration a...
peer-reviewedA call for formalizing digital forensic investigations has been proposed by academics ...
International audienceMost of malware detectors are based on syntactic signatures that identify know...
The manual methods to create detection rules are no longer prac- tical in the anti-malware product s...
We present an approach for proactive malware detection by working on an abstract representation of a...
Symbolic finite automata (SFA) allow the representation of regular languages of strings over an infi...
Metamorphic malware apply semantics-preserving transformations to their own code in order to foil de...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...