首页> 外文会议>Asia Joint Conference on Information Security >Evaluating Disassembly-Code Based Similarity between IoT Malware Samples
【24h】

Evaluating Disassembly-Code Based Similarity between IoT Malware Samples

机译:评估IoT恶意软件样本之间基于反汇编代码的相似性

获取原文

摘要

Malware samples infecting IoT (Internet of Things) devices such as web cameras and home routers have spread over the Internet, which are called IoT malware. When an IoT malware sample is captured, analyzing it can be a time-consuming task. Classification is a good solution leading to efficient malware analysis. That is, if a captured sample can be automatically classified into a malware family of already-analyzed samples, their analysis results will be a useful hint for analysis. In this research, we focus on (static) disassembly to extract features from samples used for calculating their similarities for classification. This is because disassembling malware binaries can be faster than, for example, dynamic analysis under which each sample should be run for a few minutes. However, if samples are packed (encrypted and/or compressed), disassembly does not work well. As a first step towards classification, the goal of this paper is to answer two questions: Are most IoT malware samples not packed? and Can disassembly-code based similarity work well for classification? To this end, with experiments using 8,713 in-the-wild IoT malware samples, we conducted entropy analysis and confirmed that most samples were not packed. We then generated similarity matrices based on disassembly code. After that, we visualized the samples with t-SNE (t-Distributed Stochastic Neighbor Embedding) based on the similarity matrices, and we also confirmed that similar samples were closely mapped on a two-dimensional plane and that distinct samples were comparatively, separately mapped. This means that disassembly can work well against IoT malware for classification.
机译:感染网络摄像头和家庭路由器等IoT(物联网)设备的恶意软件样本已在Internet上传播,这被称为IoT恶意软件。捕获物联网恶意软件样本后,对其进行分析可能是一项耗时的任务。分类是导致有效恶意软件分析的良好解决方案。也就是说,如果可以将捕获的样本自动分类为已经分析过的样本的恶意软件家族,则它们的分析结果将为分析提供有用的提示。在这项研究中,我们专注于(静态)反汇编以从用于计算分类相似度的样本中提取特征。这是因为拆卸恶意软件的二进制文件比动态分析要快,例如,在动态分析下,每个样本都应运行几分钟。但是,如果包装(加密和/或压缩)了样品,则拆卸效果不佳。作为迈向分类的第一步,本文的目标是回答两个问题:大多数IoT恶意软件样本是否没有打包?以及基于反汇编代码的相似性能否很好地用于分类?为此,通过使用8,713种野生IoT恶意软件样本进行的实验,我们进行了熵分析,并确认大多数样本没有包装。然后,我们根据反汇编代码生成相似度矩阵。之后,我们根据相似度矩阵使用t-SNE(t分布随机邻居嵌入)对样本进行了可视化,并且我们还确认了相似的样本在二维平面上紧密映射,并且不同的样本进行了比较,单独的映射。这意味着反汇编可以很好地与IoT恶意软件进行分类。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号