Design issues of an isolated sandbox used to analyze malwares

被引:0
|
作者
Miwa, Shinsuke [1 ,3 ]
Miyachi, Toshiyuki [2 ,3 ]
Eto, Masashi [1 ]
Yoshizumi, Masashi [2 ,4 ]
Shinoda, Yoichi [1 ,2 ,3 ]
机构
[1] Natl Inst Informat & Commun Technol, Informat Secur Res Ctr, 4-2-1 Nukui Kitamachi, Koganei, Tokyo 1848795, Japan
[2] Natl Inst Informat & Commun Technol, Hokuriku Res Ctr, Nomicity, Ishikawa, Japan
[3] Japan Adv Inst Sci &Technol, Inter Res Ctr, Nomi, Ishikawa, Japan
[4] Japan Adv Inst Sci &Technol, Sch Informat Sci, Nomi, Ishikawa, Japan
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent viruses, worms, and bots, called malwares, often have anti-analysis functions such as mechanisms that confirm connectivity to certain Internet hosts and detect virtualized environments. We discuss how malwares can be kept alive in an analyzing environment by disabling their anti-analyzing mechanisms. To avoid any impacts to/from the Internet, we conclude that analyzing environments should be disconnected from the Internet but must be able to make malwares believe that they are connected to the real Internet. We also conclude that, for executing environments to analyze anti-virtualization malwares, they should not be virtualized but must be as easily reconstructable as a virtualized environment. To reconcile these cross-purposes, we propose an approach that consists of a mimetic Internet and a malware incubator with swappable actual nodes. We implemented a prototype system and conducted an experiment to test the adequacy of our approach.
引用
收藏
页码:13 / +
页数:3
相关论文
共 50 条
  • [1] Design and Implementation of Sandbox Technique for Isolated Applications
    Ul Haq, Muhammad Shams
    Liao, Lejian
    Ma Lerong
    2016 IEEE INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2016, : 557 - 561
  • [2] An Information Diffusion Model to analyze the Behavior of Online Social Network based Malwares
    Pandey, Akansha
    Kalaimannan, Ezhil
    Venkatesan, S.
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2015, : 867 - 868
  • [3] The sandbox design experience course
    Schmit, H
    Kroll, T
    Khusid, M
    Kourtev, I
    Vijaykrishnan, N
    Landis, D
    2003 IEEE INTERNATIONAL CONFERENCE ON MICROELECTRONIC SYSTEMS EDUCATION, PROCEEDINGS, 2003, : 39 - 40
  • [4] A Comparison of Sandbox Technologies Used in Online Judge Systems
    Yi, Chao
    Feng, Su
    Gong, Zhi
    MECHANICAL DESIGN AND POWER ENGINEERING, PTS 1 AND 2, 2014, 490-491 : 1201 - 1204
  • [5] ITE Micromobility Sandbox Design Competition
    不详
    ITE JOURNAL-INSTITUTE OF TRANSPORTATION ENGINEERS, 2020, 90 (10): : 10 - 10
  • [6] Issues in the design of medical ontologies used for knowledge sharing
    Burgun A.
    Botti G.
    Le Beux P.
    Journal of Medical Systems, 2001, 25 (2) : 95 - 108
  • [7] NIH PANELS ANALYZE ISSUES ON TECHNOLOGY
    PERRY, S
    HOSPITALS, 1979, 53 (11): : 115 - 116
  • [8] Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions
    Manes, Valentin J. M.
    Jang, Daehee
    Ryu, Chanho
    Kang, Brent Byunghoon
    COMPUTERS & SECURITY, 2018, 74 : 130 - 143
  • [9] A Comprehensive Survey of Various Machine Learning Techniques to Counter Security Issues Related to Mobile Malwares
    Jamal, Ahmad
    Jaiswal, Rachana
    Sayyad, Shabnam
    Pandit, Prajjawal
    Sayyad, Farook
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2022, 13 (03): : 763 - 776
  • [10] Study of the Impact on the Radiation Design Margin of the Statistical Distributions Used to Analyze Radiation Degradation Data
    Voltine, Florian
    Miller, Florent
    Cheviron, Thibault
    IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2024, 71 (08) : 1924 - 1931