Ether: Malware Analysis via Hardware Virtualization Extensions

被引:0
|
作者
Dinaburg, Artem [1 ]
Royal, Paul [1 ]
Sharif, Monirul [1 ]
Lee, Wenke [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
关键词
Malware Analysis; Dynamic Analysis; Virtualization; Emulation; Unpacking;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplies signatures to detection systems and provides evidence for recovery and cleanup. The focal point in the malware analysis battle is how to detect versus how to hide a malware analyzer from malware during runtime. State-of-the-art analyzers reside in or emulate part of the guest; operating system and its underlying hardware, making them easy to detect; and evade. In this paper, we propose a transparent and external approach to malware analysis, which is motivated by the intuition that for a malware analyzer to be transparent, it, must, not, induce any side-effects that are unconditionally detectable by malware. Our analyzer, Ether, is based on a novel application of hardware virtualization extensions such as Intel VT, and resides completely outside of the target OS environment. Thus, there are no in-guest, software components vulnerable to detection, and there are no shortcomings that arise from incomplete or inaccurate system emulation. Our experiments are based on our study of obfuscation techniques used to create 25,000 recent; malware samples. The result's show that; Ether remains transparent and defeats, the obfuscation tools that evade existing approaches.
引用
收藏
页码:51 / 62
页数:12
相关论文
共 50 条
  • [31] A Survey of Security Issues in Hardware Virtualization
    Pek, Gabor
    Buttyan, Levente
    Bencsath, Boldizsar
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [32] Selective Hardware/Software Memory Virtualization
    Wang, Xiaolin
    Zang, Jiarui
    Wang, Zhenlin
    Luo, Yingwei
    Li, Xiaoming
    ACM SIGPLAN NOTICES, 2011, 46 (07) : 217 - 226
  • [33] A Uniquified Virtualization Approach to Hardware Security
    Stitt, Greg
    Karam, Robert
    Yang, Kai
    Bhunia, Swarup
    IEEE EMBEDDED SYSTEMS LETTERS, 2017, 9 (03) : 53 - 56
  • [34] Approach for hardware virtualization-based Rootkit detection via physical memory searching
    Zhou, Tian-Yang
    Zhu, Jun-Hu
    Li, He-Shuai
    Wang, Qing-Xian
    Ruan Jian Xue Bao/Journal of Software, 2011, 22 (SUPPL. 2): : 1 - 8
  • [35] Unknown Malware Detection Based on the Full Virtualization and SVM
    Zhao, Hengli
    Zheng, Ning
    Li, Jian
    Yao, Jingjing
    Hou, Qiang
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 473 - +
  • [36] Virtage: Server Virtualization with Hardware Transparency
    Ueno, Hitoshi
    Hasegawa, Satomi
    Hasegawa, Tomohide
    EURO-PAR 2009 PARALLEL PROCESSING WORKSHOPS, 2010, 6043 : 404 - 413
  • [37] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [38] Application Virtualization Techniques for Malware Forensics in Social Engineering
    Joe-Uzuegbu, C. K.
    Iwuchukwu, U. C.
    Ezema, L. C.
    2015 INTERNATIONAL CONFERENCE ON CYBERSPACE (CYBER-ABUJA), 2015, : 45 - 56
  • [39] HEMC: a dynamic behaviour analysis system for malware based on hardware virtualisation
    Ding, Zhenquan
    Xu, Hui
    Cui, Lei
    Fei, Haiqiang
    Liu, Yongji
    Hao, Zhiyu
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (3-4) : 390 - 410
  • [40] A comprehensive survey on hardware-assisted malware analysis and primitive techniques
    Kumar, E. Praveen
    Priyanka, S.
    COMPUTER NETWORKS, 2023, 235