首页> 外文学位 >Avleak: Profiling commercial anti-virus emulators through black box testing.
【24h】

Avleak: Profiling commercial anti-virus emulators through black box testing.

机译:Avleak:通过黑盒测试对商业反病毒模拟器进行性能分析。

获取原文
获取原文并翻译 | 示例

摘要

Binary emulation is an essential part of the antivirus malware detection process. By running binaries in emulated environments, antivirus software is able to identify malware droppers and unpackers, as well as discover novel threats through behavioral heuristic analysis. Antivirus emulators are inherently limited by a number of factors speed, memory, processor power, and copyright law (preventing redistribution of actual Windows software) to name a few. As a result, AV emulators present many artifacts that allow malware to detect that it is being run under emulator analysis and thereby behave differently.;Consumer AV emulators are incredibly vulnerable to detection attacks, but discovering artifacts that can be exploited for detection can be a time-consuming process. Researchers can either spend significant time reverse engineering emulator code, look for artifacts in process memory dumps, or inject "decoy" malware into emulator engines. With decoy malware injection, a program is created that tests some condition of the emulator (ie: will it let a program allocate 500 MB of memory, will it let a program load a given DLL, does it return the right value for a given obscure API call) and either unpacks or does not unpack malware as a result. By checking if malware was detected, researchers are able to leak some information about the internal state of the emulator. Unfortunately, this process can be slow, and often only provides negative results that can be used for detection (ie: API call X is not correctly emulated, DLL X cannot be loaded).;In this thesis we present AVLeak, a novel framework that allows researchers to extract positive data out of emulators (ie: what files are on the file system, what processes are "running" according to the process list, what is the emulated system MAC address) with just a few lines of code and a few minutes of automated testing. Treating AV emulators as a black box, we are able to extract fingerprints without any manual binary reverse engineering. We demonstrate the application of our technique to up-to-date popular commercial AVs including Kaspersky, AVG, VBA32, and the popular BitDefender engine (licensed out to 20+ AV manufacturers). We show how the technique can be used to find a wide range of emulator fingerprints including environmental traits, incorrect OS API behavior, inconsistent network emulation, timing discrepancies, and emulated CPU "red pills".;Our work has applications in both offensive and defensive capacities. In offensive contexts, artifacts discovered through AVLeak may be used by malware authors to create malware which evades detection by antivirus software. AVLeak may also be used by AV manufacturers themselves to "red team" their products, evaluating the security of their emulators with adversarial testing.
机译:二进制仿真是防病毒恶意软件检测过程的重要组成部分。通过在仿真环境中运行二进制文件,防病毒软件能够识别恶意软件删除程序和拆包程序,并通过行为启发式分析发现新的威胁。防病毒仿真器固有地受速度,内存,处理器能力和版权法(防止实际Windows软件的重新分发)等诸多因素的限制。结果,AV仿真器呈现出许多工件,这些恶意软件使恶意软件能够检测到它正在仿真器分析下运行,从而表现出不同的行为。消费者AV仿真器极易受到检测攻击的攻击,但是发现可被利用来检测的工件可能是耗时的过程。研究人员可以花费大量时间对仿真器代码进行逆向工程,在进程内存转储中查找工件,或者将“诱饵”恶意软件注入仿真器引擎。使用诱饵恶意软件注入,将创建一个程序来测试模拟器的某些条件(即:它将使程序分配500 MB的内存,是否将使程序加载给定的DLL,是否为给定的模糊函数返回正确的值) API调用),然后解压缩或不解压缩恶意软件。通过检查是否检测到恶意软件,研究人员能够泄漏一些有关模拟器内部状态的信息。不幸的是,此过程可能很慢,并且通常只能提供可用于检测的负面结果(即:API调用X不能正确仿真,DLL X无法加载)。在本文中,我们介绍了AVLeak,这是一个新颖的框架,允许研究人员从仿真器中提取正数据(即,文件系统上有哪些文件,根据进程列表“正在运行”哪些进程,什么是仿真系统MAC地址),只需几行代码和几行代码分钟的自动测试。将AV模拟器视为黑匣子,我们无需任何手动二进制逆向工程就能提取指纹。我们演示了我们的技术在最新流行的商用视音频上的应用,包括卡巴斯基,AVG,VBA32和流行的BitDefender引擎(授权给20多个视音频制造商)。我们展示了如何使用该技术来查找各种仿真器指纹,包括环境特征,错误的OS API行为,不一致的网络仿真,时序差异和仿真的CPU“红色药丸”。;我们的工作在进攻性和防御性方面都有应用能力。在令人反感的情况下,恶意软件作者可能会通过AVLeak发现的工件可以创建逃避防病毒软件检测的恶意软件。 AVLeak也可能被AV制造商自己用来“组合”他们的产品,并通过对抗测试评估其仿真器的安全性。

著录项

  • 作者

    Bulazel, Alexei.;

  • 作者单位

    Rensselaer Polytechnic Institute.;

  • 授予单位 Rensselaer Polytechnic Institute.;
  • 学科 Computer science.
  • 学位 M.S.
  • 年度 2015
  • 页码 81 p.
  • 总页数 81
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号