Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Huabiao Lu is active.

Publication


Featured researches published by Huabiao Lu.


Mathematical and Computer Modelling | 2013

ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences

Huabiao Lu; Xiaofeng Wang; Baokang Zhao; Fei Wang; Jinshu Su

Abstract Malware obfuscation obscures malware into different versions, making traditional syntactic nature based detection ineffective. Furthermore, with the huge and exponentially growing number of malware samples, existing malware detection systems are either evaded by malware obfuscation, or overwhelmed by numerous malware samples. This paper proposes an anti-obfuscation, scalable and collaborative malware detection system—ENDMal. ENDMal identifies the program that behaves suspiciously in end-hosts and similarly between a group of suspicious programs in a wide area as malicious. We present the Iterative Sequence Alignment (ISA) method to defeat malware obfuscation. Instead of using complex behavior graph, we propose the Handle dependences and Probabilistic Ordering Dependence (HPOD) technology to represent the program behaviors. In addition, we design a novel information sharing infrastructure, RENShare, to collaboratively congregate the group characteristics of programs spreading over different network areas. Our experimental results show that ENDMal can detect unknown malwares much faster than the centralized detection system and is more effective than the existing distributed detection system.


international conference on information and communication technology | 2013

DiffSig: resource differentiation based malware behavioral concise signature generation

Huabiao Lu; Baokang Zhao; Xiaofeng Wang; Jinshu Su

Malware obfuscation obscures malware into a different form thats functionally identical to the original one, and makes syntactic signature ineffective. Furthermore, malware samples are huge and growing at an exponential pace. Behavioral signature is an effective way to defeat obfuscation. However, state-of-the-art behavioral signature, behavior graph, is although very effective but unfortunately too complicated and not scalable to handle exponential growing malware samples; in addition, it is too slow to be used as real-time detectors. This paper proposes an anti-obfuscation and scalable behavioral signature generation system, DiffSig, which voids information-flow tracking which is the chief culprit for the complex and inefficiency of graph behavior, thus, losing some data dependencies, but describes handle dependencies more accurate than graph behavior by restrict the profile type of resource that each handle dependency can reference to. Our experiment results show that DiffSig is scalable and efficient, and can detect new malware samples effectively.


Wireless Personal Communications | 2014

Generating Lightweight Behavioral Signature for Malware Detection in People-Centric Sensing

Huabiao Lu; Baokang Zhao; Jinshu Su; Peidai Xie

People-centric sensing (PCS) is an emerging paradigm of sensor network which turns daily used mobile devices (such as smartphones and PDAs) to sensors. It is promising but faces severe security problems. As smartphones are already and will keep up to be attractive targets to attackers, even more, with strong connectivity and homogeneous applications, all mobile devices in PCS will risk being infected by malware more rapidly. Even worse, attackers usually obfuscate their malwares in order to avoid simple (syntactic signature based) detection. Thus, more intelligent (behavioral signature based) detection is needed. But in the field of network security, the state-of-the-art behavioral signature—behavior graph—is too complicated to be used in mobile devices. This paper proposes a novel behavioral signature generation system—SimBehavior—to generate lightweight behavioral signature for malware detection in PCS. Generated lightweight behavioral signature is a bit like regex (regular expression) rules. And thus, unlike malware detection using behavior graph is NP-Complete, using our lightweight behavioral signature is efficient and very suitable for malware detection in PCS. Our experimental results show that SimBehavior can extract behavioral signatures effectively, and generated lightweight behavioral signatures can be used to detect new malware samples in PCS efficiently and effectively.


ICoC | 2013

Mining Network Behavior Specifications of Malware Based on Binary Analysis

Peidai Xie; Yongjun Wang; Huabiao Lu; Meijian Li; Jinshu Su

Nowadays, malware, especially for a botnet, heavily employs network communication to accomplish predefined malicious functionalities. The network behavior of malware attracts attention of researchers. However, the network traffic used for network-based signatures generation and botnet detection is captured passively from an execution environment, that there are several limitations. In this paper, we present a network behavior mining approach based on binary analysis, named NBSBA. Our goal is to accurately understand the network behavior of malware in details, capture the packets the malware sample under analysis launched as soon as possible, and extract network behavior of malware as completely as possible. We firstly give a network behavior specification and then describe the NBSBA. And we implement a prototype system to evaluate the NBSBA. The experiment demonstrates that our approach is efficient.


Archive | 2012

CCS: Collaborative Malware Clustering and Signature Generation using Malware Behavioral Analysis

Huabiao Lu; Xiaofeng Wang; Jinshu Su


Archive | 2012

IP (Internet protocol) fragment processing method based on two-level table storage and transport layer information inquiry

Guohong Zhao; Huabiao Lu; Jinshu Su; Yijiao Chen; Shuhui Chen; Yong Tang; Zhigang Sun; Xiangdong Cui; Xilong Mao; Gaofeng Lv; Tao Li


Archive | 2011

Hardware multi-level table-based method for controlling output traffic

Yong Tang; Shuhui Chen; Tao Li; Jinshu Su; Yongjun Wang; Guohong Zhao; Lei Xuan; Huabiao Lu


Archive | 2011

Multiuser-supporting high-speed message diversion method

Shuhui Chen; Guohong Zhao; Yong Tang; Bo Yu; Huabiao Lu; Jinshu Su; Tao Li; Lei Xuan; Zexin Lu; Yijiao Chen


Archive | 2013

SCMA: Scalable and Collab orative Malw are Analysis using System Call Sequences

Huabiao Lu; Xiaofeng Wang; Jinshu Su


Archive | 2013

ResSig: an Resource Constrain t based Malware Behavioral Signature

Huabiao Lu; Xiaofeng Wang; Jinshu Su; Peidai Xie

Collaboration


Dive into the Huabiao Lu's collaboration.

Top Co-Authors

Avatar

Jinshu Su

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Baokang Zhao

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaofeng Wang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Yong Tang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Guohong Zhao

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Peidai Xie

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Yijiao Chen

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Yongjun Wang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Bo Yu

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Fei Wang

Southwest University

View shared research outputs
Researchain Logo
Decentralizing Knowledge