首页> 外文会议>International Symposium on Biometrics and Security Technologies >Anticipating Dormant Functionality in Malware: A Semantics Based Approach
【24h】

Anticipating Dormant Functionality in Malware: A Semantics Based Approach

机译:预测恶意软件中的休眠功能:一种基于语义的方法

获取原文

摘要

One of the challenges in malware analysis has been finding out the dormant functionality of the malware. Requirement of manual analysis along with code obfuscation and encryption rules out static analysis as it may not be effective and scalable in the face of continuously rising number of malware produced daily. Dynamic analysis on the other hand relies on the exhibited behavior of the malware, which may not exhibit the true functionality of the malware, as malware may sense the analysis environment or performs differently under different circumstances (User interaction, logic bombs and specific target etc). Finding out the complete function of a malware in case of Advanced Persistent Threat (APT) becomes imperative, to know the potential target of the APT and techniques being used by the malware authors, so that appropriate defense can be mounted proactively. Various approaches have been used to extract the dormant functionality of malware such as multiple runs and multipath or forced execution, but they have not been effective due to rigorous and exponential increase in number of paths required to be analyzed and thus are not scalable. They are costlier in terms of processing and are significantly constrained to analyze large numbers of malware samples being found daily. Structural attributes of the disassembled code may be analyzed to predict the dormant behavior but same functionality may be implemented using different structures and this approach will not be effective then. Semantics based formal techniques have a potential to identify and classify both hidden and exhibited malware behavior as they refer to a high level view of the malware attributes and behavior and are not dependent upon signature based models and even analyze new and unseen malware effectively. This paper presents a review of all efforts at adopting semantics based models for automated malware analysis and defines future work directions of the research.
机译:恶意软件分析中的挑战之一是找出恶意软件的休眠功能。手动分析以及代码混淆和加密的要求排除了静态分析的可能性,因为面对每天产生的恶意软件数量不断增加的情况,静态分析可能无效且可扩展。另一方面,动态分析依赖于恶意软件表现出的行为,而这种行为可能无法表现出恶意软件的真正功能,因为恶意软件可能会感知分析环境或在不同情况下(用户交互,逻辑炸弹和特定目标等)执行不同的操作。必须了解在高级持久威胁(APT)情况下恶意软件的完整功能,以了解APT的潜在目标和恶意软件作者正在使用的技术,以便可以主动进行适当的防御。已经使用了各种方法来提取恶意软件的休眠功能,例如多次运行和多路径或强制执行,但是由于需要分析的路径数量的严格和指数级增长,因此它们没有效果,因此无法扩展。它们的处理成本更高,并且严重限制了分析每天发现的大量恶意软件样本。可以分析反汇编代码的结构属性以预测休眠行为,但是可以使用不同的结构来实现相同的功能,因此该方法将无效。基于语义的形式化技术有潜力对隐藏的和显示的恶意软件行为进行识别和分类,因为它们指的是恶意软件属性和行为的高级视图,并且不依赖于基于签名的模型,甚至可以有效地分析新的和看不见的恶意软件。本文对采用基于语义的模型进行自动化恶意软件分析的所有工作进行了回顾,并定义了研究的未来工作方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号