Ether: Malware Analysis via Hardware Virtualization Extensions

被引:0
|
作者
Dinaburg, Artem [1 ]
Royal, Paul [1 ]
Sharif, Monirul [1 ]
Lee, Wenke [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
关键词
Malware Analysis; Dynamic Analysis; Virtualization; Emulation; Unpacking;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplies signatures to detection systems and provides evidence for recovery and cleanup. The focal point in the malware analysis battle is how to detect versus how to hide a malware analyzer from malware during runtime. State-of-the-art analyzers reside in or emulate part of the guest; operating system and its underlying hardware, making them easy to detect; and evade. In this paper, we propose a transparent and external approach to malware analysis, which is motivated by the intuition that for a malware analyzer to be transparent, it, must, not, induce any side-effects that are unconditionally detectable by malware. Our analyzer, Ether, is based on a novel application of hardware virtualization extensions such as Intel VT, and resides completely outside of the target OS environment. Thus, there are no in-guest, software components vulnerable to detection, and there are no shortcomings that arise from incomplete or inaccurate system emulation. Our experiments are based on our study of obfuscation techniques used to create 25,000 recent; malware samples. The result's show that; Ether remains transparent and defeats, the obfuscation tools that evade existing approaches.
引用
收藏
页码:51 / 62
页数:12
相关论文
共 50 条
  • [41] TPE-Det: A Tamper-Proof External Detector via Hardware Traces Analysis Against IoT Malware
    Zhao, Ziming
    Li, Zhaoxuan
    Li, Tingting
    Zhang, Fan
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (11) : 3455 - 3466
  • [42] Identifying DGA Malware via Behavior Analysis
    Zang, Xiaodong
    Gong, Jian
    Zong, Ping
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [43] Stochastic-HMDs: Adversarial-Resilient Hardware Malware Detectors via Undervolting
    Islam, Md Shohidul
    Alouani, Ihsen
    Khasawneh, Khaled N.
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [44] Implications for Hardware Acceleration of Malware Detection
    Pattee, Jordan
    Lee, Byeong Kil
    2019 IEEE 30TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2019), 2019, : 138 - 138
  • [45] Analyzing Hardware Based Malware Detectors
    Patel, Nisarg
    Sasan, Avesta
    Homayoun, Houman
    PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
  • [46] Hardware-Virtualization-Based Software Compatibility Analysis Method and Its Applications
    Hu, Xiangjiang
    Cong, Bo
    Xi, Zhendong
    Li, Kang
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2014, : 442 - 445
  • [47] A hardware virtualization based component sandboxing architecture
    Goonasekera, N. (nuwan.goonasekera@student.qut.edu), 1600, Academy Publisher (07):
  • [48] The use of hardware virtualization in the context of information security
    Silakov, D. V.
    PROGRAMMING AND COMPUTER SOFTWARE, 2012, 38 (05) : 276 - 280
  • [49] Hardware and Software Support of Technological Processes Virtualization
    Erulanova, Aizhan
    Yessenbekova, Gulzhanat
    Zhanysbayeva, Kulmira
    Tlebaldinova, Aizhan
    Zhantassova, Zheniskul
    Zhomartkyzy, Gulnaz
    2020 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS ENGINEERING (ICEEE 2020), 2020, : 333 - 337
  • [50] Efficient Use of Hardware Resources on Virtualization Environment
    Kitano, Takehiro
    Nakamura, Ryoichi
    2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), 2015,