Contextual identification of windows malware through semantic interpretation of API call sequence

Eslam Amer, Shaker El-Sappagh, Jong Wan Hu*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

5 Downloads (Pure)

Abstract

The proper interpretation of the malware API call sequence plays a crucial role in identifying its malicious intent. Moreover, there is a necessity to characterize smart malware mimicry activities that resemble goodware programs. Those types of malware imply further challenges in recognizing their malicious activities. In this paper, we propose a standard and straightforward contextual behavioral models that characterize Windows malware and goodware. We relied on the word embedding to realize the contextual association that may occur between API functions in malware sequences. Our empirical results proved that there is a considerable distinction between malware and goodware call sequences. Based on that distinction, we propose a new method to detect malware that relies on the Markov chain. We also propose a heuristic method that identifies malware’s mimicry activities by tracking the likelihood behavior of a given API call sequence. Experimental results showed that our proposed model outperforms other peer models that rely on API call sequences. Our model returns an average malware detection accuracy of 0.990, with a false positive rate of 0.010. Regarding malware mimicry, our model shows an average noteworthy accuracy of 0.993 in detecting false positives.

Original languageEnglish
Article number7673
Pages (from-to)1-15
Number of pages15
JournalApplied Sciences (Switzerland)
Volume10
Issue number21
DOIs
Publication statusPublished - 30 Oct 2020

Keywords

  • API call sequence
  • Contextual behavior
  • Malware detection
  • Malware mimicry

Fingerprint

Dive into the research topics of 'Contextual identification of windows malware through semantic interpretation of API call sequence'. Together they form a unique fingerprint.

Cite this