Dynamic analysis of malware allows us to examine malware samples, and then group those samples into families based on observed behavior. Using Boolean variables to represent the presence or absence of a range of malware behavior, we create a bitstring that represents each malware behaviorally, and then group samples into the same class if they exhibit the same behavior. Combining class definitions with malware discovery dates, we can construct a timeline of showing the emergence date of each class, in order to examine prevalence, complexity, and longevity of each class. We find that certain behavior classes are more prevalent than others, following a frequency power law. Some classes have had lower longevity, indicating that their attack profile is no longer manifested by new variants of malware, while others of greater longevity, continue to affect new computer systems. We verify for the first time commonly held intuitions on malware evolution, showing quantitatively from the archaeological record that over 80% of the time, classes of higher malware complexity emerged later than classes of lower complexity. In addition to providing historical perspective on malware evolution, the methods described in this paper may aid malware detection through classification, leading to new proactive methods to identify malicious software.
[1]
SpitznerLance.
The Honeynet Project
,
2003,
S&P 2003.
[2]
J L Marx,et al.
A virus by any other name . . .
,
1985,
Science.
[3]
Divya Bansal,et al.
Malware Analysis and Classification: A Survey
,
2014
.
[4]
Christopher Krügel,et al.
Exploring Multiple Execution Paths for Malware Analysis
,
2007,
2007 IEEE Symposium on Security and Privacy (SP '07).
[5]
Peter Szor,et al.
The Art of Computer Virus Research and Defense
,
2005
.
[6]
Zhuoqing Morley Mao,et al.
Automated Classification and Analysis of Internet Malware
,
2007,
RAID.
[7]
Eugene H. Spafford,et al.
Computer Viruses as Artificial Life
,
1994,
Artificial Life.
[8]
Zhenkai Liang,et al.
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software
,
2009,
TSEC.
[9]
Farnam Jahanian,et al.
CloudAV: N-Version Antivirus in the Network Cloud
,
2008,
USENIX Security Symposium.
[10]
Eric Filiol,et al.
Behavioral detection of malware: from a survey towards an established taxonomy
,
2008,
Journal in Computer Virology.