首页> 外文会议>2011 First SysSec Workshop >Unity in Diversity: Phylogenetic-inspired Techniques for Reverse Engineering and Detection of Malware Families
【24h】

Unity in Diversity: Phylogenetic-inspired Techniques for Reverse Engineering and Detection of Malware Families

机译:多样性中的统一性:系统发育启发的逆向工程和恶意软件家族检测技术

获取原文

摘要

We developed a framework for abstracting, aligning and analysing malware execution traces and performed a preliminary exploration of state of the art phylogenetic methods, whose strengths lie in pattern recognition and visualisation, to derive the statistical relationships within two contemporary malware families. We made use of phylogenetic trees and networks, motifs, logos, composition biases, and tree topology comparison methods with the objective of identifying common functionality and studying sources of variation in related samples. Networks were more useful for visualising short nop-equivalent code metamorphism than trees, tree topology comparison was suited for studying variations in multiple sets of homologous procedures. We found logos could be used for code normalisation, which resulted in 33% to 62% reduction in the number of instructions. A motif search showed that API sequences related to the management of memory, I/O, libraries and threading do not change significantly amongst malware variants, composition bias provided an efficient way to distinguish between families. Using context-sensitive procedure analysis, we found that 100% of a set of memory management procedures used by the FakeAV-DO and "Skyhoo" malware families were uniquely identifiable. We discuss how phylogenetic techniques can aid the reverse engineering and detection of malware families and describe some related challenges.
机译:我们开发了一个用于抽象,对齐和分析恶意软件执行轨迹的框架,并进行了最先进的系统发育方法的初步探索,该方法的优势在于模式识别和可视化,以得出两个当代恶意软件家族之间的统计关系。我们利用系统发育树和网络,主题,徽标,成分偏差和树形拓扑比较方法来确定通用功能并研究相关样本中变异的来源。网络对于可视化短等价的nop等效代码变质比树更有用,树拓扑比较适合研究多套同源过程中的变异。我们发现徽标可用于代码规范化,从而使指令数量减少了33%到62%。主题搜索显示,与内存,I / O,库和线程管理相关的API序列在恶意软件变体之间没有显着变化,成分偏向提供了区分家族的有效方法。使用上下文敏感的过程分析,我们发现FakeAV-DO和“ Skyhoo”恶意软件家族使用的一组内存管理过程中的100%是唯一可识别的。我们讨论了系统发育技术如何帮助逆向工程和恶意软件家族的检测,并描述了一些相关的挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号