首页> 外文期刊>ACM SIGPLAN Notices: A Monthly Publication of the Special Interest Group on Programming Languages >V2E: Combining Hardware Virtualization and Software Emulation for Transparent and Extensible Malware Analysis
【24h】

V2E: Combining Hardware Virtualization and Software Emulation for Transparent and Extensible Malware Analysis

机译:V2E:结合硬件虚拟化和软件仿真以进行透明和可扩展的恶意软件分析

获取原文
获取原文并翻译 | 示例
           

摘要

A transparent and extensible malware analysis platform is essential for defeating malware. This platform should be transparent so malware cannot easily detect and bypass it. It should also be extensible to provide strong support for heavyweight instrumentation and analysis efficiency. However, no existing platform can meet both requirements. Leveraging hardware virtualization technology, analysis platforms like Ether can achieve good transparency, but its instrumentation support and analysis efficiency are weak. In contrast, software emulation provides strong support for code instrumentation and good analysis efficiency by using dynamic binary translation. However, analysis platforms based on software emulation can be easily detected by malware and thus is poor in transparency. To achieve both transparency and extensibility, we propose a new analysis platform that combines hardware virtualization and software emulation. The essence is precise heterogeneous replay: the malware execution is recorded via hardware virtualization and then replayed in software. Our design ensures the execution replay to be precise. Moreover, with page-level recording granularity, the platform can easily adjust to analyze various forms of malware (a process, a kernel module, or a shared library). We implemented a prototype called V2E and demonstrated its capability and efficiency by conducting an extensive evaluation with both synthetic samples and 14 realworld emulation-resistant malware samples.
机译:透明且可扩展的恶意软件分析平台对于击败恶意软件至关重要。这个平台应该是透明的,这样恶意软件就不能轻易检测到并绕过它。它也应该是可扩展的,以为重量级仪器和分析效率提供强有力的支持。但是,现有平台无法同时满足这两个要求。利用硬件虚拟化技术,诸如Ether之类的分析平台可以实现良好的透明性,但其仪器支持和分析效率却很弱。相反,软件仿真通过使用动态二进制翻译为代码检测提供了强大的支持,并提供了良好的分析效率。但是,基于软件仿真的分析平台很容易被恶意软件检测到,因此透明度很差。为了实现透明性和可扩展性,我们提出了一个新的分析平台,该平台结合了硬件虚拟化和软件仿真。本质上是精确的异构重放:恶意软件的执行通过硬件虚拟化记录,然后在软件中重放。我们的设计确保执行重放精确。此外,借助页面级记录粒度,该平台可以轻松调整以分析各种形式的恶意软件(进程,内核模块或共享库)。我们实施了一个称为V2E的原型,并通过对合成样本和14个真实世界抗仿真恶意软件样本进行了广泛的评估,证明了其功能和效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号