Virtual Machine Introspection Based Malware Behavior Profiling and Family Grouping

نویسندگان

  • Shun-Wen Hsiao
  • Yeali S. Sun
  • Meng Chang Chen
چکیده

The proliferation of malwares have been attributed to the alternations of the original malware source codes. The malwares alternated from the same origin share some intrinsic behaviors and form a malware family. Expediently, identifying its malware family when a malware is first seen can provide useful clues to mitigating the threat. In this paper, a malware profiler (VMP) is proposed to profile the execution behaviors of a malware at the runtime by leveraging the virtual machine introspection (VMI) technique. The VMP inserts a plug-in inside the virtual machine monitor (VMM) to record the invoked Windows API calls with the parameters and return values as the profile of a malware. Based on the profiles, we then adopt a distance measurement and a phylogenetic tree construction method to discover the malware behavior groups. As expected, our study shows the malwares from a malware family are similar to each other and distinct from other malware families as well as the benign software. We then examines the goodness of the family grouping method of the VMP against existing anti-malware detection engines and some well-known grouping methods. We propose a novel peer voting method for evaluating the result of family grouping and the evaluation shows VMP is better than almost all of the compared anti-malware engines. At last, we establish a malware profiling website based on the proposed VMP for the public use.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Poster: Automatic Profiling of Evasive Mixed-Mode Malware with SEMU

Malware and malware analysis are in an arms race. While analysis tries to understand the latest malware, malware tries to evade the latest analysis techniques. Modern malicious codes can evade analysis by manipulating structures that are important to the analysis, i.e., OS and virtual machine introspection components (VMI). An advanced evasion technique is orchestrating actions between user-mod...

متن کامل

IntroLib: Efficient and transparent library call introspection for malware forensics

Dynamic malware analysis aims at revealing malware’s runtime behavior. To evade analysis, advanced malware is able to detect the underlying analysis tool (e.g., one based on emulation.) On the other hand, existing malware-transparent analysis tools incur significant performance overhead, making them unsuitable for live malware monitoring and forensics. In this paper, we present IntroLib, a prac...

متن کامل

LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis

Dynamic-analysis techniques have become the linchpins of modern malware analysis. However, software-based methods have been shown to expose numerous artifacts, which can either be detected and subverted, or potentially interfere with the analysis altogether, making their results untrustworthy. The need for less-intrusive methods of analysis has led many researchers to utilize introspection in p...

متن کامل

Virtual Machine Introspection in a Hybrid Honeypot Architecture

With the recent advent of effective and practical virtual machine introspection tools, we revisit the use of hybrid honeypots as a means to implement automated malware collection and analysis. We introduce VMIHoneymon, a high-interaction honeypot monitor which uses virtual machine memory introspection on Xen. VMI-Honeymon remains transparent to the monitored virtual machine and bypasses relianc...

متن کامل

Iterative Backtracking via Deterministic Virtual Machine Replay and Virtual Machine Introspection

We propose a security analysis system that enables tracking and understanding system intrusions fully and precisely, using deterministic virtual machine replay and virtual machine introspection. Understanding the behaviors of system intrusions is important for malware defense systems to discover their vulnerabilities and prevent them to be exploited for the future. Existing approaches fail to e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1705.01697  شماره 

صفحات  -

تاریخ انتشار 2017