signature matching
Recently Published Documents


TOTAL DOCUMENTS

100
(FIVE YEARS 17)

H-INDEX

14
(FIVE YEARS 2)

Author(s):  
Nathanael Kim ◽  
Kathryn R Tringale ◽  
Christopher Crane ◽  
Neelam Tyagi ◽  
Ricardo Otazo

Author(s):  
Marco Campion ◽  
Mila Dalla Preda ◽  
Roberto Giacobazzi

AbstractMetamorphic malware are self-modifying programs which apply semantic preserving transformations to their own code in order to foil detection systems based on signature matching. Metamorphism impacts both software security and code protection technologies: it is used by malware writers to evade detection systems based on pattern matching and by software developers for preventing malicious host attacks through software diversification. In this paper, we consider the problem of automatically extracting metamorphic signatures from the analysis of metamorphic malware variants. We define a metamorphic signature as an abstract program representation that ideally captures all the possible code variants that might be generated during the execution of a metamorphic program. For this purpose, we developed MetaSign: a tool that takes as input a collection of metamorphic code variants and produces, as output, a set of transformation rules that could have been used to generate the considered metamorphic variants. MetaSign starts from a control flow graph representation of the input variants and agglomerates them into an automaton which approximates the considered code variants. The upper approximation process is based on the concept of widening automata, while the semantic preserving transformation rules, used by the metamorphic program, can be viewed as rewriting rules and modeled as grammar productions. In this setting, the grammar recognizes the language of code variants, while the production rules model the metamorphic transformations. In particular, we formalize the language of code variants in terms of pure context-free grammars, which are similar to context-free grammars with no terminal symbols. After the widening process, we create a positive set of samples from which we extract the productions of the grammar by applying a learning grammar technique. This allows us to learn the transformation rules used by the metamorphic engine to generate the considered code variants. We validate the results of MetaSign on some case studies.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Stephen C. Gammie

AbstractDepression is a complex mental health disorder and the goal here was to identify a consistent underlying portrait of expression that ranks all genes from most to least dysregulated and indicates direction of change relative to controls. Using large-scale neural gene expression depression datasets, a combined portrait (for men and women) was created along with one for men and one for women only. The depressed brain was characterized by a “hypo” state, that included downregulation of activity-related genes, including EGR1, FOS, and ARC, and indications of a lower brain temperature and sleep-like state. MAP kinase and BDNF pathways were enriched with overlapping genes. Expression patterns suggested decreased signaling for GABA and for neuropeptides, CRH, SST, and CCK. GWAS depression genes were among depression portrait genes and common genes of interest included SPRY2 and PSEN2. The portraits were used with the drug repurposing approach of signature matching to identify treatments that could reverse depression gene expression patterns. Exercise was identified as the top treatment for depression for the combined and male portraits. Other non-traditional treatments that scored well were: curcumin, creatine, and albiflorin. Fluoxetine scored best among typical antidepressants. The creation of the portraits of depression provides new insights into the complex landscape of depression and a novel platform for evaluating and identifying potential new treatments.


2021 ◽  
Vol 40 (1) ◽  
pp. 1585-1596
Author(s):  
Xiao Zhongzheng ◽  
Nurbol Luktarhan

A webshell is a common tool for network intrusion. It has the characteristics of considerable threat and good concealment. An attacker obtains the management authority of web services through the webshell to penetrate and control web applications smoothly. Because webshell and common web page features are almost identical, it can evade detection by traditional firewalls and anti-virus software. Moreover, with the application of various anti-detection feature hiding techniques to the webshell, it is difficult to detect new patterns in time based on the traditional signature matching method. Webshell detection has been proposed based on deep learning. First, a dataset is opcoded, and the source code and opcode code features are fused. Second, the processed dataset is reduced using the SRNN and an attention mechanism, and the capsule network improves complete predictions for unknown pages. Experiments prove that the algorithm has higher detection efficiency and accuracy than traditional webshell detection methods, and it can also detect new types of webshell with a certain probability.


Symmetry ◽  
2020 ◽  
Vol 12 (12) ◽  
pp. 2011
Author(s):  
Yingpei Zeng ◽  
Shanqing Guo ◽  
Ting Wu ◽  
Qiuhua Zheng

Deep Packet Inspection (DPI) is widely used in network management and network security systems. The core part of existing DPI is signature matching, and many researchers focus on improving the signature-matching algorithms. In this paper, we work from a different angle: The scheduling of signature matching. We propose a Delayed Signature Matching (DSM) method, in which we do not always immediately match received packets to the signatures since there may be not enough packets received yet. Instead, we predefine some rules, and evaluate the packets against these rules first to decide when to start signature matching and which signatures to match. The predefined rules are convenient to create and maintain since they support custom expressions and statements and can be created in a text rule file. The correctness and performance of the DSM method are theoretically analyzed as well. Finally, we implement a prototype of the DSM method in the open-source DPI library nDPI, and find that it can reduce the signature-matching time about 30∼84% in different datasets, with even smaller memory consumption. Note that the abstract syntax trees (ASTs) used to implement DSM rule evaluation are usually symmetric, and the DSM method supports asymmetric (i.e., single-direction) traffic as well.


Sign in / Sign up

Export Citation Format

Share Document