Visible to the public Malicious code detection model based on behavior association

TitleMalicious code detection model based on behavior association
Publication TypeJournal Article
Year of Publication2014
AuthorsHan, Lansheng, Qian, Mengxiao, Xu, Xingbo, Fu, Cai, Kwisaba, Hamza
JournalTsinghua Science and Technology
Volume19
Pagination508-515
Date PublishedOct
KeywordsAutomation, behavior association, behavior monitor, Computers, Grammar, malicious code, Monitoring, pushdown automation, Trojan horses, Virtual machining
Abstract

Malicious applications can be introduced to attack users and services so as to gain financial rewards, individuals' sensitive information, company and government intellectual property, and to gain remote control of systems. However, traditional methods of malicious code detection, such as signature detection, behavior detection, virtual machine detection, and heuristic detection, have various weaknesses which make them unreliable. This paper presents the existing technologies of malicious code detection and a malicious code detection model is proposed based on behavior association. The behavior points of malicious code are first extracted through API monitoring technology and integrated into the behavior; then a relation between behaviors is established according to data dependence. Next, a behavior association model is built up and a discrimination method is put forth using pushdown automation. Finally, the exact malicious code is taken as a sample to carry out an experiment on the behavior's capture, association, and discrimination, thus proving that the theoretical model is viable.

DOI10.1109/TST.2014.6919827
Citation Key6919827