4.6 Article

ModDiff: Modularity Similarity-Based Malware Homologation Detection

Journal

ELECTRONICS
Volume 12, Issue 10, Pages -

Publisher

MDPI
DOI: 10.3390/electronics12102258

Keywords

binary code; graph embedding; graph matching; modularization; similarity detection

Ask authors/readers for more resources

In recent years, the exponential growth in the number and scale of malicious codes has posed an increasing threat to cybersecurity. Therefore, it is of great research value to quickly identify malware variants and understand their family information. This study proposes a binary code module similarity detection method called ModDiff, which improves the efficiency and accuracy of homology detection by focusing on the modular composition of malware and utilizing deep-learning techniques.
In recent years, the number and scale of malicious codes have grown exponentially, posing an increasing threat to cybersecurity. Hence, it is of great research value to quickly identify variants of malware and master their family information. Binary code similarity detection, as a key technique in reverse analysis, plays an indispensable role in malware analysis. However, most existing methods focus on similarity at the function or basic block level, ignoring the modular composition of malware. Implementing similarity detection among malware modules would greatly improve the efficiency and accuracy of homology detection. Inspired by the successful application of deep-learning techniques in program analysis, we propose a binary code module similarity detection method called ModDiff. It abstracts malware into attribute graphs, clusters functions using graph-embedded clustering algorithms to decompose malware into function-based modules, and calculates module similarity using graph-matching algorithms and natural language processing-based function similarity detection algorithms. The experimental results indicated that ModDiff improves the accuracy of module partitioning by 10.8% compared with previous work, and the highest F1 score of 89% is achieved in malware homologation detection. These results demonstrate the effectiveness of ModDiff in detecting and analyzing malware with important application value and development prospects.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available