8 research outputs found

    Proactive Detection of Computer Worms Using Model Checking

    Get PDF
    Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants mostly differ in their binary representation rather than their functionality, they can be recognized by analyzing the program behavior, even though they are not covered by the signature databases of current antivirus tools. Proactive malware detectors mitigate this risk by detection procedures that use a single signature to detect whole classes of functionally related malware without signature updates. It is evident that the quality of proactive detection procedures depends on their ability to analyze the semantics of the binary. In this paper, we propose the use of model checkinga well-established software verification techniquefor proactive malware detection. We describe a tool that extracts an annotated control flow graph from the binary and automatically verifies it against a formal malware specification. To this end, we introduce the new specification language CTPL, which balances the high expressive power needed for malware signatures with efficient model checking algorithms. Our experiments demonstrate that our technique indeed is able to recognize variants of existing malware with a low risk of false positives. © 2006 IEEE

    Autonomic context-dependent architecture for malware detection

    Get PDF

    Protecting Software through Obfuscation:Can It Keep Pace with Progress in Code Analysis?

    Get PDF
    Software obfuscation has always been a controversially discussed research area. While theoretical results indicate that provably secure obfuscation in general is impossible, its widespread application in malware and commercial software shows that it is nevertheless popular in practice. Still, it remains largely unexplored to what extent today’s software obfuscations keep up with state-of-the-art code analysis and where we stand in the arms race between software developers and code analysts. The main goal of this survey is to analyze the effectiveness of different classes of software obfuscation against the continuously improving deobfuscation techniques and off-the-shelf code analysis tools. The answer very much depends on the goals of the analyst and the available resources. On the one hand, many forms of lightweight static analysis have difficulties with even basic obfuscation schemes, which explains the unbroken popularity of obfuscation among malware writers. On the other hand, more expensive analysis techniques, in particular when used interactively by a human analyst, can easily defeat many obfuscations. As a result, software obfuscation for the purpose of intellectual property protection remains highly challenging.</jats:p

    Unapređenje savremenih helpdesk poslovnih sistema primenom naprednih inteligentnih softverskih alata

    Get PDF
    In today's business environment, the application of modern ICT technologies is crucial for each participant in the global market. Together with the products and services, the software solutions used for supporting businesses are becoming more and more complex. Therefore, modern tools and techniques for software development require constant expansion with the aim of designing and developing software solutions that will fully satisfy current customer requirements and give companies a strategic advantage in the market. The dissertation identifies the insurance industry as the key market place where these systems can be fully applied. HelpDesk system, integrated into information systems of the insurance companies, contributes to a large extent to quality of products and services and increases the level of general satisfaction of employees and service users. For this purpose, tools and techniques for developing intelligent HelpDesk system have been identified through expansion of modern object-oriented technologies by tools that allow the dynamic manipulation of the new knowledge by information system. Two well-known aspect-oriented approaches have been tested and their dominant characteristics have been combined, thus creating an original unified approach that helped to achieve the intended goals of the dissertation. In the dissertation, the implementation of the HelpDesk system in synergy with intelligent programs has been especially considered. The work of such a system is fully automated and expertise is greatly shifted from a man to a computer. By choosing the optimal algorithm for searching a database of questions, HelpDesk system is equipped with a powerful tool – neural network, which fully enables the aforesaid software functionalities

    Proactive Detection of Computer Worms Using Model Checking

    Full text link
    corecore