Malware Normalization

dc.contributor.authorChristodorescu, Mihaien_US
dc.contributor.authorKinder, Johannesen_US
dc.contributor.authorJha, Someshen_US
dc.contributor.authorKatzenbeisser, Stefanen_US
dc.contributor.authorVeith, Helmuten_US
dc.date.accessioned2012-03-15T17:19:35Z
dc.date.available2012-03-15T17:19:35Z
dc.date.created2005en_US
dc.date.issued2005en_US
dc.description.abstractMalware is code designed for a malicious purpose, such as obtaining root privilege on a host. A malware detector identifies malware and thus prevents it from adversely affecting a host. In order to evade detection by malware detectors, malware writers use various obfuscation techniques to transform their malware. There is strong evidence that commercial malware detectors are susceptible to these evasion tactics. In this paper, we describe the design and implementation of a malware normalizer that undoes the obfuscations performed by a malware writer. Our experimental evaluation demonstrates that a malware normalizer can drastically improve detection rates of commercial malware detectors. Moreover, a malware normalizer can also ease the task of forensic analysis of malware.en_US
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationTR1539en_US
dc.identifier.urihttp://digital.library.wisc.edu/1793/60462
dc.publisherUniversity of Wisconsin-Madison Department of Computer Sciencesen_US
dc.titleMalware Normalizationen_US
dc.typeTechnical Reporten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR1539.pdf
Size:
4.27 MB
Format:
Adobe Portable Document Format