JUGAAD: Comprehensive Malware Behavior-as-a-Service

被引:1
|
作者
Karapoola, Sareena [1 ]
Singh, Nikhilesh [1 ]
Rebeiro, Chester [1 ]
Kamakoti, V. [1 ]
机构
[1] Indian Inst Technol Madras, Chennai, Tamil Nadu, India
关键词
Dynamic Analysis; Malware; Run-time Behavior; Real-world; Testbeds; VOLATILE MEMORY; ACQUISITION;
D O I
10.1145/3546096.3546108
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An in-depth analysis of the impact of malware across multiple layers of cyber-connected systems is crucial for confronting evolving cyber-attacks. Gleaning such insights requires executing malware samples in analysis frameworks and observing their run-time characteristics. However, the evasive nature of malware, its dependence on real-world conditions, Internet connectivity, and short-lived remote servers to reveal its behavior, and the catastrophic consequences of its execution, pose significant challenges in collecting its real-world run-time behavior in analysis environments. In this context, we propose JUGAAD, a malware behavior-as-a-service to meet the demands for the safe execution of malware. Such a service enables the users to submit malware hashes or programs and retrieve their precise and comprehensive real-world run-time characteristics. Unlike prior services that analyze malware and present verdicts on maliciousness and analysis reports, JUGAAD provides raw run-time characteristics to foster unbounded research while alleviating the unpredictable risks involved in executing them. JUGAAD facilitates such a service with a back-end that executes a regular supply of malware samples on a real-world testbed to feed a growing data-corpus that is used to serve the users. With heterogeneous compute and Internet connectivity, the testbed ensures real-world conditions for malware to operate while containing its ramifications. The simultaneous capture of multiple execution artifacts across the system stack, including network, operating system, and hardware, presents a comprehensive view of malware activity to foster multi-dimensional research. Finally, the automated mechanisms in JUGAAD ensure that the data-corpus is continually growing and is up to date with the changing malware landscape.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 50 条
  • [21] Unveiling the Dynamic Landscape of Malware Sandboxing: A Comprehensive Review
    Debas, Elhaam
    Alhumam, Norah
    Riad, Khaled
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (03) : 1402 - 1416
  • [22] A Comprehensive study of Malware Propagation using Geometric Progression
    Tripathy, Satya Narayan
    Kapat, Sisira Kumar
    Patro, Raghunath
    Das, Susanta Kumar
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NETWORKS (CINE), 2017, : 73 - 77
  • [23] Behavior Grouping of Android Malware Family
    Hsiao, Shun-Wen
    Sun, Yeali S.
    Chen, Meng Chang
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [24] Program Behavior Fusion to Identify Malware
    Pang, Jianmin
    Zhang, Yichi
    Shan, Zhen
    You, Chao
    [J]. 2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 85 - 88
  • [25] Malware Classification Based on Dynamic Behavior
    Cabau, George
    Buhu, Magda
    Oprisa, Ciprian
    [J]. PROCEEDINGS OF 2016 18TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC), 2016, : 315 - 318
  • [26] Visualization Techniques for Malware Behavior Analysis
    Gregio, Andre R. A.
    Santos, Rafael D. C.
    [J]. SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE X, 2011, 8019
  • [27] Dynamic Behavior Evaluation for Malware Detection
    Hajmasan, Gheorghe
    Mondoc, Alexandra
    Cret, Octavian
    [J]. 2017 5TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2017,
  • [28] A survey of malware behavior description and analysis
    Bo Yu
    Ying Fang
    Qiang Yang
    Yong Tang
    Liu Liu
    [J]. Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 583 - 603
  • [29] Malware Behavior Ontology for Digital Evidence
    Liu, Jigang
    Kammar, Rashmi
    Sasaki, Ryoichi
    Uehara, Tetsutaro
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2017, : 585 - 586
  • [30] Identifying Behavior Dispatchers for Malware Analysis
    Park, Kyuhong
    Sahin, Burak
    Chen, Yongheng
    Zhao, Jisheng
    Downing, Evan
    Hu, Hong
    Lee, Wenke
    [J]. ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 759 - 773