Ether: Malware Analysis via Hardware Virtualization Extensions

被引:0
|
作者
Dinaburg, Artem [1 ]
Royal, Paul [1 ]
Sharif, Monirul [1 ]
Lee, Wenke [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
关键词
Malware Analysis; Dynamic Analysis; Virtualization; Emulation; Unpacking;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplies signatures to detection systems and provides evidence for recovery and cleanup. The focal point in the malware analysis battle is how to detect versus how to hide a malware analyzer from malware during runtime. State-of-the-art analyzers reside in or emulate part of the guest; operating system and its underlying hardware, making them easy to detect; and evade. In this paper, we propose a transparent and external approach to malware analysis, which is motivated by the intuition that for a malware analyzer to be transparent, it, must, not, induce any side-effects that are unconditionally detectable by malware. Our analyzer, Ether, is based on a novel application of hardware virtualization extensions such as Intel VT, and resides completely outside of the target OS environment. Thus, there are no in-guest, software components vulnerable to detection, and there are no shortcomings that arise from incomplete or inaccurate system emulation. Our experiments are based on our study of obfuscation techniques used to create 25,000 recent; malware samples. The result's show that; Ether remains transparent and defeats, the obfuscation tools that evade existing approaches.
引用
收藏
页码:51 / 62
页数:12
相关论文
共 50 条
  • [21] Malware Virtualization-Resistant Behavior Detection
    Sun, Ming-Kung
    Lin, Mao-Jie
    Chang, Michael
    Laih, Chi-Sung
    Lin, Hui-Tang
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 912 - 917
  • [22] Sandboxing and Virtualization Modern Tools for Combating Malware
    Greamo, Chris
    Ghosh, Anup
    IEEE SECURITY & PRIVACY, 2011, 9 (02) : 79 - 82
  • [23] NEVE: Nested Virtualization Extensions for ARM
    Lim, Jin Tack
    Dall, Christoffer
    Li, Shih-Wei
    Nieh, Jason
    Zyngier, Marc
    PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17), 2017, : 201 - 217
  • [24] Architectural virtualization extensions: A systems perspective
    Grinberg, Simon
    Weiss, Shlomo
    COMPUTER SCIENCE REVIEW, 2012, 6 (5-6) : 209 - 224
  • [25] HARDY: Hardware based Analysis for malwaRe Detection in embedded sYstems
    Kadiyala, Sai Praveen
    Garg, Mohit
    Alam, Manaar
    Ngo, Hau
    Mukhopadhyay, Debdeep
    Srikanthan, Thambipillai
    2020 IEEE 33RD INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2020, : 1 - 6
  • [26] Hardware system stops malware
    不详
    R&D MAGAZINE, 2004, 46 (01): : 17 - 17
  • [27] Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces
    Yagemann, Carter
    Sultana, Salmin
    Chen, Li
    Lee, Wenke
    INFORMATION SECURITY, ISC 2019, 2019, 11723 : 341 - 359
  • [28] Hardware acceleration for Processing Function Virtualization
    Civerchia, Federico
    Sgambelluri, Andrea
    Paolucci, Francesco
    Maggiani, Luca
    Castoldi, Piero
    Cugini, Filippo
    2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 47 - 51
  • [29] Wireless virtualization on commodity 802.11 hardware
    Smith, Gregory
    Chaturvedi, Anmol
    Mishra, Arunesh
    Banerjee, Suman
    International Conference on Mobile Computing and Networking, MobiCom'07 Co-Located Workshops -Proceedings of the the Second ACM International Workshop on Wireless Network Testbeds, Experimental Evalua, 2007, : 75 - 82
  • [30] Performance Comparison of Hardware Virtualization Platforms
    Schlosser, Daniel
    Duelli, Michael
    Goll, Sebastian
    NETWORKING 2011, PT I, 2011, 6640 : 393 - 405