SBIR-STTR Award

Malware Understanding using Dependence Graphs, Clustering, and Mining.
Award last edited on: 4/2/2019

Sponsored Program
STTR
Awarding Agency
DOD : Army
Total Award Amount
$100,000
Award Phase
1
Solicitation Topic Code
A11a-T020
Principal Investigator
Greg Zelesnik

Company Information

NovaShield Inc (AKA: Securitas Technologies Inc)

918 Deming Way, Suite 300Madison, WI 53717
Madison, WI 53717
   (608) 833-2610
   info@novashield.com
   www.novashield.com

Research Institution

----------

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2011
Phase I Amount
$100,000
The number of distinct malware being released into the wild is growing at an alarming rate. Some IT security companies are seeing more than 5,000 new malware instances each day. IT security companies can no longer keep pace with this deluge using manual, labor-intensive malware analysis techniques for generating specifications that detect them. There is a need for proven and deployable automated malware analysis techniques that can analyze large volumes of malware quickly and accurately. Researchers performing work in the area of behavior-based malware analysis are exploring new techniques that will address this problem: automated dependence graph construction; graph mining tools that identify specific behaviors in a dependence graph; semi-automated specification generation; and malware classification using clustering techniques. In this Phase I STTR proposal, NovaShield, Inc. will focus on malware understanding and aspects of malware classification. More specifically, NovaShield will concentrate on dependence graph construction algorithms that build rich dependence graphs efficiently, as well as clustering techniques that organize malware into families based on their behavior profiles. This will lay the groundwork for creating techniques that perform behavior mining and automated generation of behavior specifications for detecting malware, which will be pursued in Phase II.

Keywords:
Malware Classification, Clustering, Dependence Graphs, Behavior Mining, Malware Analysis, Automated Specification Generation

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
----
Phase II Amount
----