short filtering (Li et al., 2006). According to this al-
gorithm, if a string shares a certain number of sub-
strings, the pair is considered identical. Consequently,
they could skip many character-to-character compar-
isons in the middle of matching processes. However,
this approach is not applicable to matching malware
programs because patterns of substrings in SCFSs de-
pend on variable authors’ coding styles.
From the view point of parallelism and resource
management, there have been several approaches for
large workload distributions in scientific calculation,
such as matrix calculation (Gusev et al., 2012). It dis-
tributes workloads to multiple VMs. However, we
distribute VCPUs instead of workloads. In an ap-
proach similar to our work, some researchers have
proposed dynamic resource allocation (Kundu et al.,
2010). These studies model workloads using resource
usages, such as CPU usage, memory usage and so
on. Our work utilizes an easier modeling variable, Q,
which indicates how many workloads are distributed
as well as CPU usage.
7 CONCLUSION
Our main goal was to accelerate approximate match-
ing, which cannot classify numerous malware vari-
ants, its performance is too low. To accomplish our
objective, we proposed Malfinder with I-Filter, table
division and dynamic resource allocation which fo-
cuses on acceleration of Analyzer and apply them in-
crementally. As a result, we gained the total perfor-
mance improvement of on average 280.9 times in our
experiments; especially, the performance improve-
ment of Analyzer is 593.2 times on average.
ACKNOWLEDGEMENT
This work was supported by Ministry of Knowl-
edge Economy, Republic of Korea (Project No.
10035231).
REFERENCES
Baeza-Yates, R. and Navarro, G. (1998). Fast Approxi-
mate String Matching in a Dictionary. In Proceedings
of A South America Symposium on String Processing
and Information Retrieval, SPIRE 1998, pages 14-22,
IEEE.
Cesare, S. and Xiang, Y. (2010). Classification of Malware
Using Structured Control Flow. In Proceedings of
Australasian Symposium on parallel and Distributed
Computing, AusPDC 2010, pages 61-70, ACM.
Cesare, S., Xiang, Y. and Zhou, W. (2013). Malwise–An Ef-
fective and Efficient Classification System for Packed
and Polymorphic Malware. IEEE Transactions on
Computers, 62(6):1193-1206.
Gusev, M. and Ristov, S. (2012). Matrix multiplication per-
formance analysis in virtualized shared memory mul-
tiprocessor. In Proceedings of 35th International Con-
vention, MIPRO 2012, pages 251-256, IEEE.
Kephart, J.O. and Arnold, W.C. (1994). Automatic Ex-
traction of Computer Virus Signatures. Virus Bulletin
Conference, 1994, pages 178-184.
Kim, T., Hwang, W. Park, K. W. and Park, K. H. (2014).
I-Filter: Identical Structured Control Flow String Fil-
ter for Accelerated Malware Variant Classification. In
Proceedings of International Symposium on Biomet-
rics and Security Technologies, ISBAST 2014, IEEE.
Kundu, S., Rangaswami, R., Dutta, K. and Zhao, M. (2010).
Application performance modeling in a virtualized
environments. In Proceedings of 16th International
Symposium on High Performance Computer Architec-
ture, HPCA 2010, pages 1-10, IEEE.
Li, W. and Godzik, A. (2006). Cd-hit: a fast program
for clustering and comparing large sets of protein or
nucleotide sequences. Bioinformatics, 22(13):1658-
1659.
OKane, P., Sezer, S. and McLaughlin, K. (2011). Obfusca-
tion: The Hidden Malware. IEEE Security & Privacy,
9(5):41-47.
Park K. H., Park S. K., Hwang W., Seok H., Shin D. J., and
Park K. W. (2012). Resource Management of Many-
cores with a Hierarchical and a Hybrid Main Memory
for MN-MATE Cloud Node. In Proceedings of Eighth
World Congress on Services, SERVICES 2012, page
301-308, IEEE.
Paul B., Boris D., Keir F., Steven H., Tim H., Alex H., Rolf
N., Ian P., Andrew W. (2003). Xen and the art of virtu-
alization. In Proceedings of the 19th ACM symposium
on Operating systems principles, SOSP 2003, pages
164-177, ACM.
Sharir, M. (1980). Structural Analysis : A new approach to
flow analysis in optimizing compiler. Computer Lan-
guages, 5(3-4):141-153.
Ukkonen, E. (1986). Algorithms for approximate string
matching. Information and Control, 61(1-3):100-118.
ICISSP 2015 - 1st International Conference on Information Systems Security and Privacy
26