Aller au contenu principal

Malware Analysis with Symbolic Execution and Graph Kernel

Malware analysis techniques are divided into static and dy- namic analysis. Both techniques can be bypassed by circumvention techniques such as obfuscation. In a series of works, the authors have pro- moted the use of symbolic executions combined with machine learning to avoid such traps. Most of those works rely on natural graph-based representations that can then be plugged into graph-based learning algorithms such as Gspan. There are two main problems with this approach. The first one is in the cost of computing the graph. Indeed, working with graphs requires one to compute and representing the entire state-space of the file under analysis. As such computation is too cumbersome, the techniques often rely on developing strategies to compute a representative subgraph of the behaviors. Unfortunately, efficient graph-building strategies remain weakly explored. The second problem is in the clas- sification itself. Graph-based machine learning algorithms rely on com- paring the biggest common structures. This sidelines small but specific parts of the malware signature. In addition, it does not allow us to work with efficient algorithms such as support vector machine. We propose a new efficient open source toolchain for machine learning-based classification. We also explore how graph-kernel techniques can be used in the process. We focus on the 1-dimensional Weisfeiler-Lehman kernel, which can capture local similarities between graphs. Our experimental results show that our approach (1) outperforms existing ones by an impressive factor, (2) is resistant to static adversarial attacks.

Identificateur d'objet numérique (DOI)
https://doi.org/10.1007/978-3-031-22295-5_16