Detecting System Emulators
نویسندگان
چکیده
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be able to develop effective detection techniques and removal tools. Security companies typically analyze unknown malware samples using simulated system environments (such as virtual machines or emulators). The reason is that these environments ease the analysis process and provide more control over executing processes. Of course, the goal of malware authors is to make the analysis process as difficult as possible. To this end, they can equip their malware programs with checks that detect whether their code is executing in a virtual environment, and if so, adjust the program’s behavior accordingly. In fact, many current malware programs already use routines to determine whether they are running in a virtualizer such as VMware. The general belief is that system emulators (such as Qemu) are more difficult to detect than traditional virtual machines (such as VMware) because they handle all instructions in software. In this paper, we seek to answer the question whether this belief is justified. In particular, we analyze a number of possibilities to detect system emulators. Our results shows that emulation can be successfully detected, mainly because the task of perfectly emulating real hardware is complex. Furthermore, some of our tests also indicate that novel technologies that provide hardware support for virtualization (such as Intel Virtualization Technology) may not be as undetectable as previously thought.
منابع مشابه
A fistful of red-pills: How to automatically generate procedures to detect CPU emulators
Malware includes several protections to complicate their analysis: the longer it takes to analyze a new malware sample, the longer the sample survives and the larger number of systems it compromises. Nowadays, new malware samples are analyzed dynamically using virtual environments (e.g., emulators, virtual machines, or debuggers). Therefore, malware incorporate a variety of tests to detect whet...
متن کاملAppraisal of data-driven and mechanistic emulators of nonlinear simulators: The case of hydrodynamic urban drainage models
Many model based scientific and engineering methodologies, such as system identification, sensitivity analysis, optimization and control, require a large number of model evaluations. In particular, model based real-time control of urban water infrastructures and online flood alarm systems require fast prediction of the network response at different actuation and/or parameter values. General pur...
متن کاملStatistical Emulator Construction for Nonlinear Smart Systems
Comprehensive physical models can accurately quantify the dynamics of nonlinear and hysteretic systems but often require significant computational cost. This can reduce their effectiveness when performing sensitivity analysis, uncertainty analysis, parameter calibration or system design which typically requires multiple iterations of computationally expensive routines. This can also preclude th...
متن کاملAn Overview of Linux Container Based Network Emulation
The objective of this paper is to assess the current state of Container-Based Emulator implementations on the Linux platform. Through a narrative overview, a selection of open source Container-Based emulators are analysed to collect information regarding the technologies used to construct them to assess the current state of this emerging technology. Container-Based Emulators allows the creation...
متن کاملResilient Coordination of Networked Multiagent Systems Based on Distributed State Emulators
This note studies resilient coordination of networked multiagent systems in the presence of misbehaving agents, i.e., agents that are subject to adversaries modeled as exogenous disturbances. Apart from the existing relevant literature that make specific assumptions on the graph topology and/or the fraction of misbehaving agents, we present an adaptive control architecture based on distributed ...
متن کامل