Whole-system Fine-grained Taint Analysis for Automatic Malware Detection and Analysis
نویسندگان
چکیده
As malware is becoming increasingly sophisticated and stealthy, effective techniques for malware detection and analysis are imperative. Previous detection mechanisms are insufficient. Signature-based detection cannot detect new malware, and watch-point based behavioral detection can be evaded by stealthier design. Most previous analysis mechanisms are too coarse-grained to capture malware behavior and fail to address kernel-level attacks. We propose whole-system fine-grained taint analysis for automatic malware detection and analysis, and build a prototype called TaintQemu. By tainting data from hardware inputs and monitoring its propagation, TaintQemu generate taint graphs. The taint graph represents how information propagates during the system execution. We demonstrate that such whole-system fine-grained taint analysis can capture the intrinsic properties of many different classes of malware and thus offer effective methods for automatic malware detection and analysis. Our evaluation using a wide spectrum of real-world malware demonstrates that our system is effective in detecting many different classes of malware including keyloggers, backdoor, etc., and offer indispensable assistance to system administrators and analyzers for better understanding of the behavior and consequences of malware. also used to automatically detect a wide spectrum of malware, by checking the violations from the normal patterns in taint graph.
منابع مشابه
TEMU: Binary Code Analysis via Whole-System Layered Annotative Execution
Dynamic binary analysis has demonstrated its strength in solving a wide-spectrum of computer security problems, such as malware analysis, protocol reverse engineering, vulnerability detection, diagnosis, and defense, software testing, etc. An extensible platform for dynamic binary analysis provides a foundation for solving these problems. To enable a variety of applications, we explore a unique...
متن کاملTaint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking
Dynamic taint analysis (DTA) has been heavily used by security researchers for various tasks, including detecting unknown exploits, analyzing malware, preventing information leaks, and many more. Recently, it has been also utilized to track data across processes and hosts to shed light on the interaction of distributed components, but also for security purposes. This paper presents Taint-Exchan...
متن کاملAnomalous Taint Detection ( Extended Abstract ) ⋆
We propose anomalous taint detection, an approach that combines fine-grained taint tracking with learning-based anomaly detection. Anomaly detection is used to identify behavioral deviations that manifest when vulnerabilities are exercised. Fine-grained taint-tracking is used to target the anomaly detector on those aspects of program behavior that can be controlled by an attacker. Our prelimina...
متن کاملDetection of debugger aware malware
Computer security researchers are often placed in a difficult situation their tools need to be perfect, in terms of possible exploits, in order to not raise suspicions in analysed malware. It is in the interest of malicious code to shut down if an analyst’s presence is detected as the longer it runs, the more revenue can be generated. While malware only needs to find one weakness in the analysi...
متن کاملAnti-Taint-Analysis: Practical Evasion Techniques Against Information Flow Based Malware Defense
Taint-tracking is emerging as a general technique in software security to complement virtualization and static analysis. It has been applied for accurate detection of a wide range of attacks on benign software, as well as in malware defense. Although it is quite robust for tackling the former problem, application of taint analysis to untrusted (and potentially malicious) software is riddled wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006