Analysis and Detection of Metamorphic Computer Viruses

نویسندگان

  • Wing Wong
  • Mark Stamp
  • Robert Chun
  • Suneuy Kim
  • Sami Khuri
چکیده

comparison between our approach and commercial virus scanners. I would also like to thank my friends and schoolmates for their technical and emotional support. I want to thank Yue Wang for performing the virus scanning, and Peter Hey for repairing my hard disk after it crashed at the most critical moment. Finally I want to thank my family for their understanding and support throughout my five years of graduate studies. They have shown the greatest care and patience which I truly appreciate. Abstract Computer virus writers commonly use metamorphic techniques to produce viruses that change their internal structure on each infection. It is generally believed that these metamorphic viruses are extremely difficult to detect. Metamorphic virus generating kits are readily available, so that little knowledge or skill is required to create these potentially devastating viruses. In this project, we first analyze four virus creation kits to determine the degree of metamorphism provided by each. We are able to precisely quantify the degree of metamorphism produced by these virus generators. While the best generator, the Next Generation Virus Creation Kit (NGVCK), produces virus variants that differ greatly from one another, the other three generators we examined are much less effective. We then show that three popular commercial virus scanners cannot detect any of the NGVCK viruses in our test set. We proceed to develop an effective metamorphic virus detection technique based on hidden Markov models (HMM). With this HMM detector, we are able to classify a given program as belonging to a particular virus family or not. Using this approach, we can detect all metamorphic viruses in our test set with extremely high accuracy. We also present a simpler detection method that detects metamorphic viruses with high accuracy. Our results show that the best available metamorphic generator is effective at morphing viral code and that the resulting morphed viruses are not detectable using popular commercial virus scanning software. Surprisingly, these viruses differ sufficiently from non-viral code so that they are detectable using a similarity technique that we present in this paper. It remains an interesting open question whether metamorphic viral code can be constructed which is undetectable using our techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Metamorphic Virus: Analysis and Detection

Metamorphic viruses transform their code as they propagate, thus evading detection by static signature-based virus scanners, while keeping their functionality. They use code obfuscation techniques to challenge deeper static analysis and can also beat dynamic analyzers, such as emulators, by altering their behavior. To achieve this, metamorphic viruses use several metamorphic transformations, in...

متن کامل

Metamorphic Viruses Detection Technique Based on the the Modified Emulators

An article presents a new technique for metamorphic viruses detection using modified emulators, placed in the hosts of the network. Proposed technique provides the classification of the metamorphic virus in classes with the usage of the fuzzy logic. Technique makes it possible to detect the metamorphic viruses, which use obfuscation techniques. The results of experimental studies showed the eff...

متن کامل

Advanced Metamorphic Techniques in Computer Viruses

Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses. However detection by emulation can defeat simple polymorphism: thus metamorphic techniques are used which thoroughly change the viral code, even after decryption. We briefly detail this evolution of virus protection techniques against detection and then study the METAPHOR...

متن کامل

Metamorphic Virus Variants Classification Using Opcode Frequency Histogram

In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obfuscation approaches. They transform their code in new instances as look entirely or partly different and contain dissimilar sequences of string, but their behavior and function remain unchanged. This obfuscation process allows ...

متن کامل

Metamorphic Viruses Really Invincible ? Part 1

When you consider all the tricks that a virus writer can use to break AV scanners, metamorphic viruses, such as Win32/Evol, Metaphor (aka W32/Simile, see VB, May 2002, p.4) and W95/Zmist (see VB, March 2001 p.6) appear invincible. These viruses transform their code as they propagate, thus evading detection by analysers that rely on static information extracted from previously observed virus cod...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006