Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป Taking Malware Detection To The Next Level (Down)
Tweet

connect with us

Taking Malware Detection To The Next Level (Down)

Abstract: 

Several highly sophisticated rootkits have garnered media attention over the past few weeks, highlighting the vulnerability of current anti-malware techniques to layer-below attacks. These new rootkits are not the only area of weakness in traditional anti-malware techniques. For example, "morphing" viruses evade string scanning by altering their code structure between generations. Emulation techniques can sometimes detect these morphing viruses, but its effectiveness is limited by its high computational cost, imprecision, and the development of anti-emulation techniques.

Our solution to layer-below attacks and morphing viruses is low-level, behavior-based threat detection. As malicious software has grown more complex, disk drive processors have grown more powerful. We propose using this new, under-utilized processing power to augment traditional anti-virus and rootkit detection techniques with direct computation on the disk processor. Disk processors are privy to the low-level behavior of malware that alters data on its host, allowing us to identify threats based on patterns of I/O requests. The location and isolation of the disk make it well-suited for malware detection, since it can see all I/O requests and is immune to subversion by a rootkit. Additionally, signatures made from low-level behavioral patterns cannot be confused by equivalent code substitution (i.e., morphing viruses). As an added benefit, disk-level monitoring comes at a low cost: it requires little extra effort from the CPU because it observes the behavior of normally running programs.

Adrienne Felt, University of Virginia

Nathanael Paul, University of Virginia

David Evans, University of Virginia

Sudhanva Gurumurthi, University of Virginia

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@conference {268865,
author = {Adrienne Felt and Nathanael Paul and David Evans and Sudhanva Gurumurthi},
title = {Taking Malware Detection To The Next Level (Down)},
year = {2006},
address = {Vancouver, B.C. Canada},
publisher = {USENIX Association},
month = jul,
}
Download

Presentation Video

Presentation Audio

MP3 Download OGG Download

Download Audio

  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Contact Us