Fake Emulation Environment to Prevent Malware from Executing

نویسنده

  • Collin Mulliner
چکیده

Today’s malware contains sophisticated analysis countermeasures to protect itself against reverse engineering. Countermeasures fall into two categories: offline and runtime. Encryption and obfuscation of binaries are widely used offline protections. Therefore today, most analysis is done during runtime and so malware authors implement runtime countermeasures. Runtime countermeasures include anti-debugging techniques and detection of emulation and analysis environments. Upon detecting an emulation environment, said malware behaves normally and does not execute its malicious payload; often, it even goes into an idle state. The specific countermeasure in which we are interested is the detection of analysis and emulation environments. There exist different methods for detecting such environments by abusing hardware specifics such as CPU bugs or timing issues [2] and by detecting leftovers in the operating systems such as driver and file names [1]. The main idea of this work is confusing the countermeasure code implemented by malware through faking parts of an emulation environment, in the hope that this makes it harder for malware authors to figure out how to really detect analysis environments. The whole malware/anti-malware situation is an arms race with each side always trying to get a head start. The state of the art is to try to make analysis and emulation environments as close as possible to real systems to prevent detection. This idea tries to do the opposite by sprinkling small fake traces of system emulators into real systems. The chief challenge for implementing such a system is that fake traces have to be carefully designed to not be easily detectable as fake and to not have an negative impact on the actual system. BODY Faking just enough of common emulation and analysis environments might prevent certain kinds malware from executing their malicious payload.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks

Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...

متن کامل

Eliminate Evading Analysis Tricks in Malware using Dynamic Slicing

In order to be a long time alive, modern malware often make anti-emulation check after launched for evading dynamic analysis. Malware authors gain fingerprint information of target environment through several API to detect whether their creations are running in monitored state or not. If an emulated analysis environment is detected, the malware will change its running to avoid malicious behavio...

متن کامل

Detecting System Emulators

Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be able to develop effective detection techniques and removal tools. Security companies typically analyze unknown malware samples using simulated system environments (such as virtual machines or emulators). The reason is ...

متن کامل

FakeDetector: A measurement-based tool to get rid out of fake content in your BitTorrent Downloads

Fake content represents an important portion of those files shared in BitTorrent. In this paper we conduct a large scale measurement study in order to analyse the fake content publishing phenomenon in the BitTorrent Ecosystem. Our results reveal that a few tens of users are responsible for 90% of the fake content. Furthermore, more than 99% of the analysed fake files are linked to either malwar...

متن کامل

The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution

We present a study of Fake Anti-Virus attacks on the web. Fake AV software masquerades as a legitimate security product with the goal of deceiving victims into paying registration fees to seemingly remove malware from their computers. Our analysis of 240 million web pages collected by Google’s malware detection infrastructure over a 13 month period discovered over 11,000 domains involved in Fak...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • TinyToCS

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2012