Design and analysis of a new feature-distributed malware

Byungho Min, Vijay Varadharajan

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)

Abstract

In this paper, we propose a new advanced malware that distributes its features to multiple software components in order to bypass various security policies such as application white listing and security tools like anti-virus. A tool that automatically generates such malware has been developed, and malware instances generated by this tool have been evaluated, showing the risks of the proposed malware. The new threat proposed in this paper is particularly important in modern computing platforms since they have progressed to more secure environments with various defensive techniques such as application-based permission and application white listing. In addition, anti-virus solutions are improving their detection techniques, especially based on behavioural properties. Our offensive technique is designed to overcome these hurdles so that appropriate defensive mitigations can be explored before the adversary develops such offensive technique as they always have done.

Original languageEnglish
Title of host publicationProceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages457-464
Number of pages8
ISBN (Electronic)9781479965137
ISBN (Print)9781479965144
DOIs
Publication statusPublished - 2014
Event13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014 - Beijing, China
Duration: 24 Sept 201426 Sept 2014

Publication series

NameIEEE International Conference on Trust Security and Privacy in Computing and Communications
PublisherIEEE
ISSN (Print)2324-898X

Other

Other13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014
Country/TerritoryChina
CityBeijing
Period24/09/1426/09/14

Keywords

  • Feature distribution
  • Malware
  • Security
  • Software component

Fingerprint

Dive into the research topics of 'Design and analysis of a new feature-distributed malware'. Together they form a unique fingerprint.

Cite this