1400/09/17
On the Identification and Detection of Hidden Malware Behaviors 23 Azar
آقای دکتر محمد هادی علاییان
استادیار دانشکده مهندسی
کامپیوتر
سه شنبه 32 آذرماه 0011
ساعت 03:21 تا 01
Link: https://meetbk.kntu.ac.ir/b/zar-iaf-581
 

 معاونت پژوهشی دانشکده مهندس کامپیوتر
هفته پژوهش گرامی باد

The malware analysis process is one of the most difficult, complex, tedious, and time-consuming steps of the malware detection process. Governments have supported and funded for identifying the malware automatically. Several automated techniques have been developed. Despite lots of supports and funds, the number of cyber-attacks is growing. Since signature-based malware detection techniques have non-solved prob-lems to clarify polymorphism and metamorphism malware, researchers and antimal-ware companies have used malicious behavioral patterns. However, it does not solve the problem of the daily increase in the number of cyber-attacks. We clarified that identifying non-correct and non-accurate behavior is the main problem of behavioral analysis. Also, each behavior is the reflex of an event. Hidden behaviors observe when the conditions that trigger the behavior be provided. There is a question of what the requirements are. A behavior can be modeled by a graph that has vertexes and edges. Vertexes describe system calls, and edges illustrate the relation of system calls. An-other problem is the merge of graphs in different conditions that malware is ana-lyzed. The point is a set of truth behavior can throw a malicious behavior. A problem is the fusion of behaviors. Therefore, conducting a layered architecture of benign be-havior that describes malicious behavior can be helpful. Consequently, a layered graph-based model for malware can be generated that involves environmental condi-tions. These conditions can be applied to the malware in an isolated or limited sand-box. Another problem is generating a non-detectable sandbox .
آقای دکتر محمد هادی علاییان
استادیار دانشکده مهندسی
کامپیوتر
سه شنبه 32 آذرماه 0011
ساعت 03:21 تا 01
Link: https://meetbk.kntu.ac.ir/b/zar-iaf-581
 
 
تعداد بازدید:
476
كليه حقوق اين وب سايت متعلق به دانشگاه خواجه نصير الدين طوسي ميباشد.