A behavior based malware detection scheme for avoiding false positive

Author(s):  
Yoshiro Fukushima ◽  
Akihiro Sakai ◽  
Yoshiaki Hori ◽  
Kouichi Sakurai
2021 ◽  
pp. 102558
Author(s):  
Yi Sun ◽  
Ali Kashif Bashir ◽  
Usman Tariq ◽  
Fei Xiao

Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 957 ◽  
Author(s):  
Juhyun Park ◽  
Yongsu Park

Software uses cryptography to provide confidentiality in communication and to provide authentication. Additionally, cryptographic algorithms can be used to protect software against cracking core algorithms in software implementation. Recently, malware and ransomware have begun to use encryption to protect their codes from analysis. As for the detection of cryptographic algorithms, previous works have had demerits in analyzing anti-reverse engineered binaries that can detect differences in analysis environments and normal execution. Here, we present a new symmetric-key cryptographic routine detection scheme using hardware tracing. In our experiments, patterns were successfully generated and detected for nine symmetric-key cryptographic algorithms. Additionally, the experimental results show that the false positive rate of our scheme is extremely low and the prototype implementation successfully bypasses anti-reversing techniques. Our work can be used to detect symmetric-key cryptographic routines in malware/ransomware with anti-reversing techniques.


Author(s):  
Hong Jhe Li ◽  
Chia-Wei Tien ◽  
Chin-Wei Tien ◽  
Chih-Hung Lin ◽  
Hahn-Ming Lee ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document