Virtual Machine Introspection Based Malware Behavior Profiling and Family Grouping
نویسندگان
چکیده
The proliferation of malwares have been attributed to the alternations of the original malware source codes. The malwares alternated from the same origin share some intrinsic behaviors and form a malware family. Expediently, identifying its malware family when a malware is first seen can provide useful clues to mitigating the threat. In this paper, a malware profiler (VMP) is proposed to profile the execution behaviors of a malware at the runtime by leveraging the virtual machine introspection (VMI) technique. The VMP inserts a plug-in inside the virtual machine monitor (VMM) to record the invoked Windows API calls with the parameters and return values as the profile of a malware. Based on the profiles, we then adopt a distance measurement and a phylogenetic tree construction method to discover the malware behavior groups. As expected, our study shows the malwares from a malware family are similar to each other and distinct from other malware families as well as the benign software. We then examines the goodness of the family grouping method of the VMP against existing anti-malware detection engines and some well-known grouping methods. We propose a novel peer voting method for evaluating the result of family grouping and the evaluation shows VMP is better than almost all of the compared anti-malware engines. At last, we establish a malware profiling website based on the proposed VMP for the public use.
منابع مشابه
Poster: Automatic Profiling of Evasive Mixed-Mode Malware with SEMU
Malware and malware analysis are in an arms race. While analysis tries to understand the latest malware, malware tries to evade the latest analysis techniques. Modern malicious codes can evade analysis by manipulating structures that are important to the analysis, i.e., OS and virtual machine introspection components (VMI). An advanced evasion technique is orchestrating actions between user-mod...
متن کاملIntroLib: Efficient and transparent library call introspection for malware forensics
Dynamic malware analysis aims at revealing malware’s runtime behavior. To evade analysis, advanced malware is able to detect the underlying analysis tool (e.g., one based on emulation.) On the other hand, existing malware-transparent analysis tools incur significant performance overhead, making them unsuitable for live malware monitoring and forensics. In this paper, we present IntroLib, a prac...
متن کاملLO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
Dynamic-analysis techniques have become the linchpins of modern malware analysis. However, software-based methods have been shown to expose numerous artifacts, which can either be detected and subverted, or potentially interfere with the analysis altogether, making their results untrustworthy. The need for less-intrusive methods of analysis has led many researchers to utilize introspection in p...
متن کاملVirtual Machine Introspection in a Hybrid Honeypot Architecture
With the recent advent of effective and practical virtual machine introspection tools, we revisit the use of hybrid honeypots as a means to implement automated malware collection and analysis. We introduce VMIHoneymon, a high-interaction honeypot monitor which uses virtual machine memory introspection on Xen. VMI-Honeymon remains transparent to the monitored virtual machine and bypasses relianc...
متن کاملIterative Backtracking via Deterministic Virtual Machine Replay and Virtual Machine Introspection
We propose a security analysis system that enables tracking and understanding system intrusions fully and precisely, using deterministic virtual machine replay and virtual machine introspection. Understanding the behaviors of system intrusions is important for malware defense systems to discover their vulnerabilities and prevent them to be exploited for the future. Existing approaches fail to e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1705.01697 شماره
صفحات -
تاریخ انتشار 2017