A survey of malware behavior description and analysis

Bo Yu*, Ying Fang, Qiang Yang, Yong Tang, Liu Liu

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

50 Citations (Scopus)

Abstract

Behavior-based malware analysis is an important technique for automatically analyzing and detecting malware, and it has received considerable attention from both academic and industrial communities. By considering how malware behaves, we can tackle the malware obfuscation problem, which cannot be processed by traditional static analysis approaches, and we can also derive the as-built behavior specifications and cover the entire behavior space of the malware samples. Although there have been several works focusing on malware behavior analysis, such research is far from mature, and no overviews have been put forward to date to investigate current developments and challenges. In this paper, we conduct a survey on malware behavior description and analysis considering three aspects: malware behavior description, behavior analysis methods, and visualization techniques. First, existing behavior data types and emerging techniques for malware behavior description are explored, especially the goals, principles, characteristics, and classifications of behavior analysis techniques proposed in the existing approaches. Second, the inadequacies and challenges in malware behavior analysis are summarized from different perspectives. Finally, several possible directions are discussed for future research.

Original languageEnglish
Pages (from-to)583-603
Number of pages21
JournalFrontiers of Information Technology and Electronic Engineering
Volume19
Issue number5
DOIs
Publication statusPublished - 1 May 2018
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2018, Zhejiang University and Springer-Verlag GmbH Germany, part of Springer Nature.

Keywords

  • Behavior analysis
  • Behavior data expression
  • Behavior visualization
  • Dynamic Analysis
  • Machine learning
  • Malware behavior
  • Malware evolution
  • Semantics-based analysis
  • Static analysis
  • TP309.5

Fingerprint

Dive into the research topics of 'A survey of malware behavior description and analysis'. Together they form a unique fingerprint.

Cite this