Whole-system Fine-grained Taint Analysis for Automatic Malware Detection and Analysis

نویسندگان

  • Heng Yin
  • Dawn Song
چکیده

As malware is becoming increasingly sophisticated and stealthy, effective techniques for malware detection and analysis are imperative. Previous detection mechanisms are insufficient. Signature-based detection cannot detect new malware, and watch-point based behavioral detection can be evaded by stealthier design. Most previous analysis mechanisms are too coarse-grained to capture malware behavior and fail to address kernel-level attacks. We propose whole-system fine-grained taint analysis for automatic malware detection and analysis, and build a prototype called TaintQemu. By tainting data from hardware inputs and monitoring its propagation, TaintQemu generate taint graphs. The taint graph represents how information propagates during the system execution. We demonstrate that such whole-system fine-grained taint analysis can capture the intrinsic properties of many different classes of malware and thus offer effective methods for automatic malware detection and analysis. Our evaluation using a wide spectrum of real-world malware demonstrates that our system is effective in detecting many different classes of malware including keyloggers, backdoor, etc., and offer indispensable assistance to system administrators and analyzers for better understanding of the behavior and consequences of malware. also used to automatically detect a wide spectrum of malware, by checking the violations from the normal patterns in taint graph.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TEMU: Binary Code Analysis via Whole-System Layered Annotative Execution

Dynamic binary analysis has demonstrated its strength in solving a wide-spectrum of computer security problems, such as malware analysis, protocol reverse engineering, vulnerability detection, diagnosis, and defense, software testing, etc. An extensible platform for dynamic binary analysis provides a foundation for solving these problems. To enable a variety of applications, we explore a unique...

متن کامل

Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking

Dynamic taint analysis (DTA) has been heavily used by security researchers for various tasks, including detecting unknown exploits, analyzing malware, preventing information leaks, and many more. Recently, it has been also utilized to track data across processes and hosts to shed light on the interaction of distributed components, but also for security purposes. This paper presents Taint-Exchan...

متن کامل

Anomalous Taint Detection ( Extended Abstract ) ⋆

We propose anomalous taint detection, an approach that combines fine-grained taint tracking with learning-based anomaly detection. Anomaly detection is used to identify behavioral deviations that manifest when vulnerabilities are exercised. Fine-grained taint-tracking is used to target the anomaly detector on those aspects of program behavior that can be controlled by an attacker. Our prelimina...

متن کامل

Detection of debugger aware malware

Computer security researchers are often placed in a difficult situation their tools need to be perfect, in terms of possible exploits, in order to not raise suspicions in analysed malware. It is in the interest of malicious code to shut down if an analyst’s presence is detected as the longer it runs, the more revenue can be generated. While malware only needs to find one weakness in the analysi...

متن کامل

Anti-Taint-Analysis: Practical Evasion Techniques Against Information Flow Based Malware Defense

Taint-tracking is emerging as a general technique in software security to complement virtualization and static analysis. It has been applied for accurate detection of a wide range of attacks on benign software, as well as in malware defense. Although it is quite robust for tackling the former problem, application of taint analysis to untrusted (and potentially malicious) software is riddled wit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006