Visible to the public Using Dynamic Taint Approach for Malware Threat

TitleUsing Dynamic Taint Approach for Malware Threat
Publication TypeConference Paper
Year of Publication2015
AuthorsWang, P., Lin, W. H., Chao, W. J., Chao, K. M., Lo, C. C.
Conference Name2015 IEEE 12th International Conference on e-Business Engineering
Date Publishedoct
KeywordsAnalytical models, Android programs, attack sequence, behavioural analysis, cloud applications, cloud computing, cloud computing server, Computational modeling, Computer crime, Computer hacking, cyber security attack, data tracking, defence capability, Dynamic taint propagation, dynamic taint propagation analysis model, finite state machine, finite state machines, FSM, information flow, intersuspicious modules, invasive software, Malware, Malware behavioural analysis, malware infection, malware threat analysis, network threats, pubcrawl170109, Servers, suspicious apps, taint checking tools, taint marking, threat analysis, trees (mathematics), weighted spanning tree analysis scheme
Abstract

Most existing approaches focus on examining the values are dangerous for information flow within inter-suspicious modules of cloud applications (apps) in a host by using malware threat analysis, rather than the risk posed by suspicious apps were connected to the cloud computing server. Accordingly, this paper proposes a taint propagation analysis model incorporating a weighted spanning tree analysis scheme to track data with taint marking using several taint checking tools. In the proposed model, Android programs perform dynamic taint propagation to analyse the spread of and risks posed by suspicious apps were connected to the cloud computing server. In determining the risk of taint propagation, risk and defence capability are used for each taint path for assisting a defender in recognising the attack results against network threats caused by malware infection and estimate the losses of associated taint sources. Finally, a case of threat analysis of a typical cyber security attack is presented to demonstrate the proposed approach. Our approach verified the details of an attack sequence for malware infection by incorporating a finite state machine (FSM) to appropriately reflect the real situations at various configuration settings and safeguard deployment. The experimental results proved that the threat analysis model allows a defender to convert the spread of taint propagation to loss and practically estimate the risk of a specific threat by using behavioural analysis with real malware infection.

DOI10.1109/ICEBE.2015.75
Citation Keywang_using_2015