Visible to the public Evolved Similarity Techniques in Malware Analysis

TitleEvolved Similarity Techniques in Malware Analysis
Publication TypeConference Paper
Year of Publication2019
AuthorsBlack, Paul, Gondal, Iqbal, Vamplew, Peter, Lakhotia, Arun
Conference Name2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Keywordsbinary similarity, Databases, evolved code, evolved similarity techniques, function call graph, graph theory, Human Behavior, invasive software, Malware, malware analysis, malware authors, malware evolution, malware family, malware function pairs, malware function similarity techniques, malware samples, malware similarity, Manuals, Metrics, Predictive Metrics, privacy, pubcrawl, Registers, Resiliency, reverse engineering, Semantics, Zeus, Zeus malware
Abstract

Malware authors are known to reuse existing code, this development process results in software evolution and a sequence of versions of a malware family containing functions that show a divergence from the initial version. This paper proposes the term evolved similarity to account for this gradual divergence of similarity across the version history of a malware family. While existing techniques are able to match functions in different versions of malware, these techniques work best when the version changes are relatively small. This paper introduces the concept of evolved similarity and presents automated Evolved Similarity Techniques (EST). EST differs from existing malware function similarity techniques by focusing on the identification of significantly modified functions in adjacent malware versions and may also be used to identify function similarity in malware samples that differ by several versions. The challenge in identifying evolved malware function pairs lies in identifying features that are relatively invariant across evolved code. The research in this paper makes use of the function call graph to establish these features and then demonstrates the use of these techniques using Zeus malware.

DOI10.1109/TrustCom/BigDataSE.2019.00061
Citation Keyblack_evolved_2019