Screening legitimate and fake/crude antivirus software

Masaki Kasuya, Kenji Kono

研究成果: Article

抜粋

Fake antivirus (AV) software, a kind of malware, pretends to be a legitimate AV product and frightens computer users by showing fake security alerts, as if their computers were infected with malware. In addition, fake AV urges users to purchase a "commercial" version of the fake AV. In this paper, we search for an indicator that captures behavioral differences in legitimate AV and fake AV. The key insight behind our approach is that legitimate AV behaves differently in clean and infected environments, whereas fake AV behaves similarly in both environments, because it does not analyze malware in the infected environments. We have investigated three potential indicators, file access pattern, CPU usage, and memory usage, and found that memory usage is an effective indicator to distinguish legitimate AV from fake AV. In an experiment, this indicator identifies all fake AV samples (39 out of 39) as fake and all legitimate AV products (8 out of 8) as legitimate. It is impractical for fake AV to evade this indicator because to do so would require it to detect malware infections, just as legitimate AV does.

元の言語English
ページ(範囲)43-51
ページ数9
ジャーナルIPSJ Online Transactions
7
発行部数2014
DOI
出版物ステータスPublished - 2014 1 1

    フィンガープリント

ASJC Scopus subject areas

  • Computer Science(all)

これを引用