Hacia la detección de software malicioso consciente del entorno de análisis aislado (Towards the Detection of Isolation-Aware Malware)

Ricardo J. Rodríguez (rjrodriguez@unizar.es)1, Iñaki Rodríguez Gastón (inaki@virtualminds.es)2, Javier Alonso (javier.alonso@unileon.es)3


1University of Zaragoza
2MLW.re NGO
3University of León

This paper appears in: Revista IEEE América Latina

Publication Date: Feb. 2016
Volume: 14,   Issue: 2 
ISSN: 1548-0992


Abstract:
Malware analysis tools have evolved in the last years providing tightly controlled sandbox and virtualised environments where malware is analysed minimising potential harmful consequences. Unfortunately, malware has advanced in parallel, being currently able to recognise when is running in sandbox or virtual environments and then, behaving as a non-harmful application or even not executing at all. This kind of malware is usually called analysis-aware malware. In this paper, we propose a tool to detect the evasion techniques used by analysis-aware malware within sandbox or virtualised environments. Our tool uses Dynamic Binary Instrumentation to maintain the binary functionality while executing arbitrary code. We evaluate the tool under a set of well-known analysis-aware malware showing its current effectiveness. Finally, we discuss limitations of our proposal and future directions.

Index Terms:
analysis-aware malware, binary analysis, dynamic binary instrumentation   


Documents that cite this document
This function is not implemented yet.


[PDF Full-Text (563)]