Finding Non-trivial Malware Naming Inconsistencies

نویسندگان

  • Federico Maggi
  • Andrea Bellini
  • Guido Salvaneschi
  • Stefano Zanero
چکیده

Abstract Malware analysts, and in particular antivirus vendors, never agreed on a single naming convention for malware specimens. This leads to confusion and difficulty—more for researchers than for practitioners—for example, when comparing coverage of different antivirus engines, when integrating and systematizing known threats, or comparing the classifications given by different detectors. Clearly, solving naming inconsistencies is a very difficult task, as it requires that vendors agree on a unified naming convention. More importantly, solving inconsistencies is impossible without knowing exactly where they are. Therefore, in this paper we take a step back and concentrate on the problem of finding inconsistencies. To this end, we first represent each vendor’s naming convention with a graph-based model. Second, we give a precise definition of inconsistency with respect to these models. Third, we define two quantitative measures to calculate the overall degree of inconsistency between vendors. In addition, we propose a fast algorithm that finds non-trivial (i.e., beyond syntactic differences) inconsistencies. Our experiments on four major antivirus vendors and 98,798 real-world malware samples confirm anecdotal observations that different vendors name viruses differently. More importantly, we were able to find inconsistencies that cannot be inferred at all by looking solely at the syntax.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Federico Maggi- Updated on January 10, 2012

I am a Post-doctorate Research Assistant at Dipartimento di Elettronica e Informazione, Politecnico di Milano in Italy, working at the VPLAB [14] with Prof. Stefano Zanero. Specifically, my current research interests are in security visualization of large-scale, malicious activity on the Internet, new security aspects of cloud-computing, malware naming inconsistencies, and automatic shoulder su...

متن کامل

Rebuilding the Tower of Babel

Anti-virus systems developed by different vendors often demonstrate strong discrepancies in how they name malware, which signficantly hinders malware information sharing. While existing work has proposed a plethora of malware naming standards, most antivirus vendors were reluctant to change their own naming conventions. In this paper we explore a new, more pragmatic alternative. We propose to e...

متن کامل

An Automated Virus Classification System Gheorghescu

In recent years, significant interest has developed around automated malware classification methods and an industry-wide naming convention. However, in the anti-virus industry, virus naming is not a uniformly standardized process and only worsens with each new malware sample. Virus naming cannot be reliable unless the virus analyst can tell if a new sample is part of an existing family in a rea...

متن کامل

All Your iFRAMEs Point to Us

As the web continues to play an ever increasing role in information exchange, so too is it becoming the prevailing platform for infecting vulnerable hosts. In this paper, we provide a detailed study of the pervasiveness of so-called drive-by downloads on the Internet. Driveby downloads are caused by URLs that attempt to exploit their visitors and cause malware to be installed and run automatica...

متن کامل

Comparing Verb and Object Naming Between Patients With Parkinson Disease and Patients With Cortical Stroke

Objectives: Based on recent studies, verb naming is more impaired than noun naming in patients with Parkinson Disease (PD). Noun and verb retrieval problems has been well documented in patients with cortical damage. To explore the possible contribution of cortex and subcortex areas in word finding test performance, we studied verb and object naming in patients with cortical and subcortical lesi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011