Polymorphic Attacks against Sequence-based Software Birthmarks
نویسندگان
چکیده
Sequence alignment algorithms have recently found a use in detecting code clones, software plagiarism, code theft, and polymorphic malware. This approach involves extracting birthmarks, in this case sequences, from programs and comparing them using sequence alignment, a procedure which has been intensively studied in the field of bioinformatics. This idea seems promising. However, we have shown that an attacker can evade detection by considering the positions of inserted dummy code and/or the frequency of function calls. Moreover, we found that randomly inserting and deleting symbols in the sequence was ineffective. By using birthmark sequences extracted from actual malicious and benign programs, we found that the most effective strategy was to use a hybrid approach incorporating “non-consecutive insertion” and “highest frequency deletion”. We also discuss the implementation costs of such attacks and propose using non-determinism through concurrent programming as an alternative evasion strategy.
منابع مشابه
Design and evaluation of birthmarks for detecting theft of java programs
¡¡¡¡¡¡¡ 200402.tex ABSTRACT To detect theft of Java class files efficiently, we have so far proposed a concept of Java birthmarks. Since the birthmarks are unique and native characteristics of every class file, a class file with the same birthmark of another can be easily suspected as a copy. However, performance and tolerance of the birthmarks against sophisticated attacks had not been evaluat...
متن کاملDynamic Software Birthmarks to Detect the Theft of Windows Applications
This paper proposes dynamic software birthmarks which can be extracted during execution of Windows applications. Birthmarks are unique and native characteristics of software. For a pair of software p and q, if q has the same birthmarks as p’s, q is suspected as a copy of p. Our security analysis showed that the proposed birthmark has good tolerance against various kinds of program transformatio...
متن کاملJava Birthmarks - Detecting the Software Theft -
To detect the theft of Java class files efficiently, we propose a concept of Java birthmarks, which are unique and native characteristics of every class file. For a pair of class files p and q, if q has the same birthmark as p’s, q is suspected as a copy of p. Ideally, the birthmarks should satisfy the following properties: (a) preservation – the birthmarks should be preserved even if the origi...
متن کاملDetecting Theft of Java Applications via a Static Birthmark Based on Weighted Stack Patterns
A software birthmark means the inherent characteristics of a program that can be used to identify the program. A comparison of such birthmarks facilitates the detection of software theft. In this paper, we propose a static Java birthmark based on a set of stack patterns, which reflect the characteristic of Java applications. A stack pattern denotes a sequence of bytecodes that share their opera...
متن کاملExploiting thread-related system calls for plagiarism detection of multithreaded programs
Dynamic birthmarking used to be an effective approach to detecting software plagiarism. Yet the new trend towards multithreaded programming renders existing algorithms almost useless, due to the fact that thread scheduling nondeterminism severely perturbs birthmark generation and comparison. In this paper, we redesign birthmark based software plagiarism detection algorithms to make such approac...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012