International audienceWe present an approach for proactive malware detection by working on an abstract representation of a program behavior. Our technique consists in abstracting program traces, by rewriting given subtraces into abstract symbols representing their functionality. Traces are captured dynamically by code instrumentation in order to handle packed or self-modifying malware. Suspicious behaviors are detected by comparing trace abstractions to reference malicious behaviors. The expressive power of abstraction allows us to handle general suspicious behaviors rather than specific malware code and then, to detect malware mutations. We present and discuss an implementation validating our approach
We introduce a new representation for monitored behavior of malicious software called Malware Instru...
We introduce a new representation for monitored behavior of malicious soft-ware called Malware Instr...
Malware detectors require a specification of malicious behav-ior. Typically, these specifications ar...
Abstract. We present an approach for proactive malware detection working by abstraction of program b...
We present an approach for proactive malware detection by working on an abstract representation of a...
Abstract. This work is a weighted generalization of the abstraction based analysis tech-nique we pre...
We propose a formal approach for behavioral analysis of programs based on dynamic analysis. It works...
Abstract. We propose a formal approach for the detection of high-level malware behaviors. Our techni...
We propose a formal approach for behavioral analysis of programs based on dynamic analysis. It works...
L’analyse comportementale traditionnelle opère en général au niveau de l’implantation de comportemen...
Traditional behavior analysis usually operates at the implementation level of a malicious behavior. ...
International audienceWe propose a formal approach for the detection of high-level malware behaviors...
Traditional behavior analysis usually operates at the implementation level of malicious behaviors. Y...
Abstract—To handle the growing flood of malware, security vendors and analysts rely on tools that au...
A daily task of malware analysts is the extraction of behaviors from malicious binaries. Such behavi...
We introduce a new representation for monitored behavior of malicious software called Malware Instru...
We introduce a new representation for monitored behavior of malicious soft-ware called Malware Instr...
Malware detectors require a specification of malicious behav-ior. Typically, these specifications ar...
Abstract. We present an approach for proactive malware detection working by abstraction of program b...
We present an approach for proactive malware detection by working on an abstract representation of a...
Abstract. This work is a weighted generalization of the abstraction based analysis tech-nique we pre...
We propose a formal approach for behavioral analysis of programs based on dynamic analysis. It works...
Abstract. We propose a formal approach for the detection of high-level malware behaviors. Our techni...
We propose a formal approach for behavioral analysis of programs based on dynamic analysis. It works...
L’analyse comportementale traditionnelle opère en général au niveau de l’implantation de comportemen...
Traditional behavior analysis usually operates at the implementation level of a malicious behavior. ...
International audienceWe propose a formal approach for the detection of high-level malware behaviors...
Traditional behavior analysis usually operates at the implementation level of malicious behaviors. Y...
Abstract—To handle the growing flood of malware, security vendors and analysts rely on tools that au...
A daily task of malware analysts is the extraction of behaviors from malicious binaries. Such behavi...
We introduce a new representation for monitored behavior of malicious software called Malware Instru...
We introduce a new representation for monitored behavior of malicious soft-ware called Malware Instr...
Malware detectors require a specification of malicious behav-ior. Typically, these specifications ar...