LEVERAGING BEHAVIOR-BASED RULES FOR MALWARE FAMILY CLASSIFICATION
First Claim
1. An electronic device comprising:
- one or more hardware processors; and
a memory coupled to the one or more processors, the memory comprises software that, when executed by the one or more hardware processors, (i) determines whether a sequence of rules correspond to potential malicious behaviors detected during analysis of a malware sample, and in response to determining that the sequence of rules corresponds to potential malicious behaviors, (ii) attempts to classify the sample to at least one known malware family based on an analysis of the sequence of rules.
6 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, a malware classification scheme operating with an electronic device, configured with one or more hardware processors and a memory that stores the software handling the malware classification scheme that is conducted through analysis of behavior-based rules, is described. This malware classification scheme (i) conducts a determination whether a sequence of rules correspond to potential malicious behaviors detected during analysis of a malware sample within one or more virtual machines, and in response to determining that the sequence of rules corresponds to potential malicious behaviors, (ii) conducts an attempt to classify the malware sample to at least one known malware family based on an analysis of the sequence of rules.
180 Citations
20 Claims
-
1. An electronic device comprising:
-
one or more hardware processors; and a memory coupled to the one or more processors, the memory comprises software that, when executed by the one or more hardware processors, (i) determines whether a sequence of rules correspond to potential malicious behaviors detected during analysis of a malware sample, and in response to determining that the sequence of rules corresponds to potential malicious behaviors, (ii) attempts to classify the sample to at least one known malware family based on an analysis of the sequence of rules. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An electronic device comprising:
-
one or more hardware processors; and a memory coupled to the one or more processors, the memory comprises dynamic analysis logic that includes components that, when executed by the one or more hardware processors, generate one or more virtual machines that are configured to process a malware sample and monitor behaviors of the malware sample during processing within the one or more virtual machines, correlation logic that, when executed by the one or more hardware processors, conducts a determination as to whether a sequence of rules correspond to potential malicious behaviors detected during analysis of the malware sample within the one or more virtual machines, and classification logic that, when executed by the one or more hardware processors and in response to determining that the sequence of rules corresponds to potential malicious behaviors, attempts to classify the malware sample to at least one known malware family based on an analysis of the sequence of rules. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. An electronic device comprising:
-
one or more hardware processors; and a memory coupled to the one or more processors, the memory comprises one or more software components that, when executed by the one or more hardware processors, generates one or more virtual machines that process a malware sample and monitor behaviors by the malware sample during processing within the one or more virtual machines, correlation logic that, when executed by the one or more hardware processors, determines a sequence of rules that correspond to potential malicious behaviors detected during analysis of a malware sample within one or more virtual machines, and filters the sequence of rules by removal of one or more rules corresponding to one or more potentially malicious behaviors based on severity of the one or more potentially malicious behaviors, and classification logic that, when executed by the one or more hardware processors, compares the filtered sequence of rules to unique rules associated with a known malware family. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification