Screening legitimate and fake/crude antivirus software

Masaki Kasuya, Kenji Kono

研究成果: Article査読

抄録

Fake antivirus (AV) software, a kind of malware, pretends to be a legitimate AV product and frightens computer users by showing fake security alerts, as if their computers were infected with malware. In addition, fake AV urges users to purchase a "commercial" version of the fake AV. In this paper, we search for an indicator that captures behavioral differences in legitimate AV and fake AV. The key insight behind our approach is that legitimate AV behaves differently in clean and infected environments, whereas fake AV behaves similarly in both environments, because it does not analyze malware in the infected environments. We have investigated three potential indicators, file access pattern, CPU usage, and memory usage, and found that memory usage is an effective indicator to distinguish legitimate AV from fake AV. In an experiment, this indicator identifies all fake AV samples (39 out of 39) as fake and all legitimate AV products (8 out of 8) as legitimate. It is impractical for fake AV to evade this indicator because to do so would require it to detect malware infections, just as legitimate AV does.

本文言語English
ページ(範囲)43-51
ページ数9
ジャーナルIPSJ Online Transactions
7
2014
DOI
出版ステータスPublished - 2014 1 1

ASJC Scopus subject areas

  • コンピュータ サイエンス(全般)

フィンガープリント

「Screening legitimate and fake/crude antivirus software」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル