In recent years malware has become increasingly sophisticated and difficult to detect prior to exploitation. While there are plenty of approaches to malware detection, they all have shortcomings when it comes to identifying malware correctly prior to exploitation. The trade-off is usually between false positives, causing overhead, preventing normal usage and the risk of letting the malware execute and cause damage to the target. We present a novel end-to-end solution for in-memory malicious activity detection done prior to exploitation by leveraging machine learning capabilities based on data from unique run-time logs, which are carefully curated in order to detect malicious activity in the memory of protected processes. This solution achieves reduced overhead and false positives as well as deployment simplicity. We implemented our solution for Windows-based systems, employing multi disciplinary knowledge from malware research, machine learning, and operating system internals. Our experimental evaluation yielded promising results. As we expect future sophisticated malware may try to bypass it, we also discuss how our solution can be extended to thwart such bypassing attempts.
翻译:近年来,恶意软件越来越复杂,难以在开发前发现。虽然在正确识别恶意软件方面有许多方法在开发前发现恶意软件方面有许多缺点。 权衡通常是在假阳性、造成间接费用、防止正常使用和让恶意软件执行和损害目标的风险之间。 我们提出了一个新颖的端对端解决方案,用于在开发之前通过利用基于独特的运行时日志数据的机器学习能力进行模拟恶意活动探测,这些系统经过仔细整理,以便在被保护过程的记忆中发现恶意活动。这个解决方案可以减少间接费用、假阳性以及部署的简单性。我们实施了基于视窗的系统解决方案,利用恶意软件研究、机器学习和操作系统内部的多门化知识。我们的实验性评估产生了可喜的结果。我们期望未来的尖端恶意软件可能试图绕过它,我们也讨论如何扩大我们的解决方案,以阻止这种绕过尝试。