×

Method to detect zero-day malware applications using dynamic behaviors

  • US 10,607,011 B1
  • Filed: 07/21/2016
  • Issued: 03/31/2020
  • Est. Priority Date: 07/21/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method to identify and detect zero-day malware applications based on behavioural analysis comprising:

  • identifying different behaviour types consisting of;

    file read and write operations, started services, loaded classes, sent SMS and phone calls, listing broadcast receivers, cryptography operations performed using system calls;

    creating an infrastructure to intercept and catch dynamic activities of a running application in offline mode through setting up a virtual machine or a sandbox on a server and hooking predefined system calls or activities; and

    distributing a dynamic behaviour signature, said signature based on dynamic features, to antivirus engines running on user'"'"'s mobile devices;

    scanning and monitoring by said antivirus engines said running application for behaviours of said application once said running application is started;

    said dynamic behavior signature is created on server side comprising;

    gathering malware applications belonging to a same malware family from a malware repository;

    running said malware applications for several times and collecting the activity occurrences in time for each run;

    creating said dynamic behaviour signature; and

    storing said dynamic behaviour signature in a database to be distributed to clients;

    intercepting activities of said application, collecting said activities and comparing with said dynamic behaviour signatures where a comparison between said dynamic signature and actual behaviour is performed based on behaviour type and time of occurrence;

    determining a similarity ratio for each said dynamic signature; and

    verdicting a detection of malware for said running application if the similarity ratio is above 90% of a profile where said profile is a dynamic signature of a malware family and said profile is created offline using virtual devices and/or real devices, running modified operating systems, in order to hook application runtime behaviours comprising;

    determining threshold for acceptable occurrence rate;

    determining threshold for acceptable time delay;

    determining threshold for probability of occurrence; and

    creating by aggregation process said profile for each malware family type.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×