• DocumentCode
    3549446
  • Title

    Detecting stealth software with Strider GhostBuster

  • Author

    Wang, Yi-Min ; Beck, Doug ; Vo, Binh ; Roussev, Roussi ; Verbowski, Chad

  • Author_Institution
    Microsoft Res., Redmond, WA, USA
  • fYear
    2005
  • fDate
    28 June-1 July 2005
  • Firstpage
    368
  • Lastpage
    377
  • Abstract
    Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet. Resource hiding is a powerful stealth technique commonly used by malware to evade detection by computer users and anti-malware scanners. In this paper, we focus on a subclass of malware, termed "ghostware", which hide files, configuration settings, processes, and loaded modules from the operating system\´s query and enumeration application programming interfaces (APIs). Instead of targeting individual stealth implementations, we describe a systematic framework for detecting multiple types of hidden resources by leveraging the hiding behavior as a detection mechanism. Specifically, we adopt a cross-view diff-based approach to ghostware detection by comparing a high-level infected scan with a low-level clean scan and alternatively comparing an inside-the-box infected scan with an outside-the-box clean scan. We describe the design and implementation of the Strider GhostBuster tool and demonstrate its efficiency and effectiveness in detecting resources hidden by real-world malware such as rootkits, Trojans, and key-loggers.
  • Keywords
    Internet; application program interfaces; data encapsulation; query processing; security of data; Internet; Strider GhostBuster tool; application programming interface; ghostware detection; inside-the-box infected scan; outside-the-box clean scan; real-world malware; resource hiding; stealth malware program; stealth software detection; Application software; Computer crime; Computer industry; Data structures; EPROM; Filtering; Internet; Operating systems; Software tools; Wood industry;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on
  • Print_ISBN
    0-7695-2282-3
  • Type

    conf

  • DOI
    10.1109/DSN.2005.39
  • Filename
    1467811