首页> 外文期刊>Software >Holography: a behavior-based profiler for malware analysis
【24h】

Holography: a behavior-based profiler for malware analysis

机译:全息术:用于恶意软件分析的基于行为的探查器

获取原文
获取原文并翻译 | 示例
       

摘要

Behavior-based detection and signature-based detection are two popular approaches to malware (malicious software) analysis. The security industry, such as the sector selling antivirus tools, has been using signature and heuristic-based technologies for years. However, this approach has been proven to be inefficient in identifying unknown malware strains. On the other hand, the behavior-based malware detection approach has a greater potential in identifying previously unknown instances of malicious software. The accuracy of this approach relies on techniques to profile and recognize accurate behavior models. Unfortunately, with the increasing complexity of malicious software and limitations of existing automatic tools, the current behavior-based approach cannot discover many newer forms of malware either. In this paper, we implement 'holography platform', a behavior-based profiler on top of a virtual machine emulator that intercepts the system processes and analyzes the CPU instructions, CPU registers, and memory. The captured information is stored in a relational database, and data mining techniques are used to extract information. We demonstrate the breadth of the 'holography platform' by conducting two experiments: a packed binary behavior analysis and a malvertising (malicious advertising) incident tracing. Both tasks are known to be very difficult to do efficiently using existing methods and tools. We demonstrate how the precise behavior information can be easily obtained using the 'holography platform' tool. With these two experiments, we show that the 'holography platform' can provide security researchers and automatic malware detection systems with an efficient malicious software behavior analysis solution.
机译:基于行为的检测和基于签名的检测是恶意软件(恶意软件)分析的两种流行方法。安全行业(例如销售防病毒工具的行业)多年来一直使用基于签名和启发式技术的技术。但是,这种方法已被证明在识别未知恶意软件株方面效率低下。另一方面,基于行为的恶意软件检测方法在识别以前未知的恶意软件实例方面具有更大的潜力。这种方法的准确性取决于描述和识别准确行为模型的技术。不幸的是,随着恶意软件的复杂性增加和现有自动工具的局限性,当前基于行为的方法也无法发现许多新型的恶意软件。在本文中,我们实现了“全息平台”,这是在虚拟机仿真器之上的基于行为的探查器,它拦截系统进程并分析CPU指令,CPU寄存器和内存。捕获的信息存储在关系数据库中,数据挖掘技术用于提取信息。我们通过进行两个实验来演示“全息平台”的广度:压缩二进制行为分析和恶意(恶意广告)事件跟踪。众所周知,使用现有方法和工具很难高效地完成这两项任务。我们演示了如何使用“全息平台”工具轻松获得精确的行为信息。通过这两个实验,我们表明“全息平台”可以为安全研究人员和自动恶意软件检测系统提供有效的恶意软件行为分析解决方案。

著录项

  • 来源
    《Software》 |2012年第9期|p.1107-1136|共30页
  • 作者单位

    Department ofElectrical Engineering, National Taiwan University, 106 Taipei, Taiwan;

    Department ofElectrical Engineering, National Taiwan University, 106 Taipei, Taiwan;

    Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan;

    Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan;

    Department ofElectrical Engineering, National Taiwan University, 106 Taipei, Taiwan;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    virtual machine emulator; malware analyzer; sandbox; dynamic malware analysis; malware unpacker; malvertising;

    机译:虚拟机仿真器;恶意软件分析器;沙箱动态恶意软件分析;恶意软件解压缩程序;恶意广告;
  • 入库时间 2022-08-17 13:03:49

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号