MALICIOUS BEHAVIOR DETECTION METHOD USING API SEQUENCE IN BINARY EXECUTION PATH

Malicious Behavior Detection Method Using API Sequence in Binary Execution Path

Malicious Behavior Detection Method Using API Sequence in Binary Execution Path

Blog Article

Today, the amount of malware is growing very rapidly, and the types and behaviors of malware are becoming very diverse.Unlike existing malicious codes, new types or variants of malicious codes are being identified, and it takes a lot of time to analyze all malicious codes.To solve these problems malware analysts analyze and research effective ways to reduce analysis time and cost.In this paper, we propose a method to express characteristics and detect malicious codes by using API Sequence for malicious code detection Latest Product Releases & Innovations – Stay Updated! and classification.It compares and analyzes several existing expression methods and verifies the effectiveness through actual gruvi golden lager malicious code samples.

Using the expression method proposed in the paper, we detected six malicious behaviors: DLL Injection, Downloader, IAT Hooking, Key Logger, Screen Capture and Antidebugging.As a result, more detection was detected than by conventional detection methods, and it can be seen that the more complex the malicious behavior, the higher the detection efficiency.In addition, static analysis was adopted as the main method, but because it searches execution compression, the flow of malicious behavior can be analyzed.

Report this page