Using Dynamic Taint Approach for Malware Threat
Title | Using Dynamic Taint Approach for Malware Threat |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Wang, P., Lin, W. H., Chao, W. J., Chao, K. M., Lo, C. C. |
Conference Name | 2015 IEEE 12th International Conference on e-Business Engineering |
Date Published | oct |
Keywords | Analytical models, Android programs, attack sequence, behavioural analysis, cloud applications, cloud computing, cloud computing server, Computational modeling, Computer crime, Computer hacking, cyber security attack, data tracking, defence capability, Dynamic taint propagation, dynamic taint propagation analysis model, finite state machine, finite state machines, FSM, information flow, intersuspicious modules, invasive software, Malware, Malware behavioural analysis, malware infection, malware threat analysis, network threats, pubcrawl170109, Servers, suspicious apps, taint checking tools, taint marking, threat analysis, trees (mathematics), weighted spanning tree analysis scheme |
Abstract | Most existing approaches focus on examining the values are dangerous for information flow within inter-suspicious modules of cloud applications (apps) in a host by using malware threat analysis, rather than the risk posed by suspicious apps were connected to the cloud computing server. Accordingly, this paper proposes a taint propagation analysis model incorporating a weighted spanning tree analysis scheme to track data with taint marking using several taint checking tools. In the proposed model, Android programs perform dynamic taint propagation to analyse the spread of and risks posed by suspicious apps were connected to the cloud computing server. In determining the risk of taint propagation, risk and defence capability are used for each taint path for assisting a defender in recognising the attack results against network threats caused by malware infection and estimate the losses of associated taint sources. Finally, a case of threat analysis of a typical cyber security attack is presented to demonstrate the proposed approach. Our approach verified the details of an attack sequence for malware infection by incorporating a finite state machine (FSM) to appropriately reflect the real situations at various configuration settings and safeguard deployment. The experimental results proved that the threat analysis model allows a defender to convert the spread of taint propagation to loss and practically estimate the risk of a specific threat by using behavioural analysis with real malware infection. |
DOI | 10.1109/ICEBE.2015.75 |
Citation Key | wang_using_2015 |
- pubcrawl170109
- Information Flow
- intersuspicious modules
- invasive software
- malware
- Malware behavioural analysis
- malware infection
- malware threat analysis
- network threats
- FSM
- Servers
- suspicious apps
- taint checking tools
- taint marking
- threat analysis
- trees (mathematics)
- weighted spanning tree analysis scheme
- Computer hacking
- Android programs
- attack sequence
- behavioural analysis
- cloud applications
- Cloud Computing
- cloud computing server
- Computational modeling
- Computer crime
- Analytical models
- cyber security attack
- data tracking
- defence capability
- Dynamic taint propagation
- dynamic taint propagation analysis model
- finite state machine
- finite state machines