【24h】

Environmental Authentication in Malware

机译:恶意软件中的环境验证

获取原文

摘要

Malware needs to execute on a target machine while simultaneously keeping its pay load confidential from a malware analyst. Standard encryption can be used to ensure the confidentiality, but it does not address the problem of hiding the key. Any analyst can find the decryption key if it is stored in the malware or derived in plain view. One approach is to derive the key from a part of the environment which changes when the analyst is present. Such malware derives a key from the environment and encrypts its true functionality under this key. In this paper, we present a formal framework for environmental authentication. We formalize the interaction between malware and analyst in three settings: (1) blind: in which the analyst does not have access to the target environment, (2) basic: where the analyst can load a single analysis toolkit on an effected target, and (3) resettable: where the analyst can create multiple copies of an infected environment. We show necessary and sufficient conditions for malware security in the blind and basic games and show that even under mild conditions, the analyst can always win in the resettable scenario.
机译:恶意软件需要在目标机器上执行,同时将其薪酬负担从恶意软件分析师保密。标准加密可用于确保机密性,但它不会解决隐藏关键的问题。如果它存储在恶意软件中或在普通视图中派生,则任何分析师都可以找到解密密钥。一种方法是从分析师存在时改变的环境中的一部分中派生了钥匙。此类恶意软件从环境中派生一个密钥,并在此键下加密其真实功能。在本文中,我们为环境认证提供了一个正式的框架。我们将恶意软件与分析师之间的交互正式三种设置:(1)盲:分析师无法访问目标环境,(2)基本:分析师可以在有效的目标上加载单个分析工具包, (3)重新分解:分析师可以创建多个受感染环境的副本。我们为盲人和基础游戏中的恶意软件安全表明了必要和充分的条件,并表明即使在温和的条件下,分析师也可以始终赢得可重置的情况。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号