METHODS AND SYSTEMS FOR MALWARE DETECTION BASED ON ENVIRONMENT-DEPENDENT BEHAVIOR
First Claim
1. ) A method of classifying malicious computer code, the method comprising:
- monitoring, by one or more computing processors, execution of a computer program comprising suspicious computer code;
recognizing access by the computer program of an item of environmental information;
identifying a plurality of execution paths in the computer program dependant on a branch in the computer program based on a value of the accessed item of environmental information;
determining that a first execution path in the plurality of execution paths results in benign behavior and that a second execution path in the plurality of execution paths results in malicious behavior;
classifying the computer program as evasive malware responsive to the determining.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure is directed to methods and systems for malware detection based on environment-dependent behavior. Generally, an analysis environment is used to determine how input collected from an execution environment is used by suspicious software. The methods and systems described identify use of environmental information to decide between execution paths leading to malicious behavior or benign activity. In one aspect, one embodiment of the invention relates to a method comprising monitoring execution of suspect computer instructions; recognizing access by the instructions of an item of environmental information; identifying a plurality of execution paths in the instructions dependant on a branch in the instructions based on a value of the accessed item of environmental information; and determining that a first execution path results in benign behavior and that a second execution path results in malicious behavior. The method comprises classifying the computer instructions as evasive malware responsive to the determination.
-
Citations
20 Claims
-
1. ) A method of classifying malicious computer code, the method comprising:
-
monitoring, by one or more computing processors, execution of a computer program comprising suspicious computer code; recognizing access by the computer program of an item of environmental information; identifying a plurality of execution paths in the computer program dependant on a branch in the computer program based on a value of the accessed item of environmental information; determining that a first execution path in the plurality of execution paths results in benign behavior and that a second execution path in the plurality of execution paths results in malicious behavior; classifying the computer program as evasive malware responsive to the determining. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15)
-
-
12. ) A system for classifying malicious computer code, the system comprising one or more computing processors configured to:
-
monitor execution of a computer program comprising suspicious computer code; recognize access by the computer program of an item of environmental information; identify a plurality of execution paths in the computer program dependant on a branch in the computer program based on a value of the accessed item of environmental information; determine that a first execution path in the plurality of execution paths results in benign behavior and that a second execution path in the plurality of execution paths results in malicious behavior; and classify the computer program as evasive malware responsive to the determining. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification