Deakin University
Browse

An evaluation of API calls hooking performance

Download (426.66 kB)
conference contribution
posted on 2008-01-01, 00:00 authored by M Marhusin, Henry Larkin, C Lokan, D Cornforth
An open research question in malware detection is how to accurately and reliably distinguish a malware program from a benign one, running on the same machine. In contrast to code signatures, which are commonly used in commercial protection software, signatures derived from system calls have the potential to form the basis of a much more flexible defense mechanism. However, the performance degradation caused by monitoring systems calls could adversely impact the machine. In this paper we report our experimental experience in implementing API hooking to capture sequences of API calls. The loading time often common programs was benchmarked with three different settings: plain, computer with antivirus and computer with API hook. Results suggest that the performance of this technique is sufficient to provide a viable approach to distinguishing between benign and malware code execution

History

Pagination

315 - 319

Location

Suzhou, China

Open access

  • Yes

Start date

2008-12-13

End date

2008-12-17

ISBN-13

9780769535081

Language

eng

Publication classification

E1.1 Full written paper - refereed

Copyright notice

2008, IEEE

Title of proceedings

CIS 2008 : International Conference on Computational Intelligence and Security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC