首页> 外文会议>International Conference on Telecommunications >Functions-based CFG Embedding for Malware Homology Analysis
【24h】

Functions-based CFG Embedding for Malware Homology Analysis

机译:基于功能的CFG嵌入恶意软件同源性分析

获取原文

摘要

Malware homology analysis aims at detecting whether different malicious code originates from the same set of malicious code or is written by the same author or team, and whether it has intrinsic relevance and similarity. At the same time, the homology analysis of malicious code is also an important part of studying the groups behind different APT (Advanced Persistent Threat) attacks. At present, homology identification still relies on manual analysis and security experts' experience in the anti-malware industry. In addition, research on large-scale malicious code automated homology analysis is still insufficient. The method proposed in this paper is to solve the problem of large-scale malicious code homology automatic analysis, and hope to provide auxiliary information for discovering the group behind the APT attack. In this paper, we collected samples of different APT groups from public threat intelligence and proposed a novel approach to classify these samples into different APT groups to further analyze the homology of malware. We combined the CFG (Control Flow Graph) of the malicious code function and the disassembled code of the stripped malware to generate the embedding, i.e., a numeric vector, which formed a function feature database of the APT group, and presented a neural network model used for APT group classification. We have implemented our approach in a prototype system called MCrab. Our extensive evaluation showed that MCrab could produce high accuracy results, with few to no false positives. Our research also showed that deep learning can be successfully applied to malware homology analysis.
机译:恶意软件同源性分析旨在检测不同的恶意代码是否来自同一组恶意代码或由同一作者或团队编写,以及是否具有内在相关性和相似性。与此同时,恶意代码的同源性分析也是研究不同APT(高级持续威胁)攻击背后的团体的重要组成部分。目前,同源性识别仍依赖于手动分析和安全专家在反恶意软件行业的经验。此外,对大规模恶意代码自动同源性分析的研究仍然不足。本文提出的方法是解决大规模恶毒代码同源自动分析的问题,并希望提供用于在APT攻击后面发现该组的辅助信息。在本文中,我们从公共威胁情报中收集了不同APT组的样本,并提出了一种新的方法,将这些样本分类为不同的APT组,以进一步分析恶意软件的同源性。我们组合了恶意代码函数的CFG(控制流程图)和剥离恶意软件的分解代码,以生成嵌入的嵌入,即,形成APT组的函数特征数据库的数字向量,并呈现神经网络模型用于APT组分类。我们在称为MCRAB的原型系统中实现了我们的方法。我们的广泛评估显示,MCRAB可以产生高精度的结果,很少没有误报。我们的研究还表明,可以成功地应用于恶意软件同源性分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号