DocumentCode :
3549446
Title :
Detecting stealth software with Strider GhostBuster
Author :
Wang, Yi-Min ; Beck, Doug ; Vo, Binh ; Roussev, Roussi ; Verbowski, Chad
Author_Institution :
Microsoft Res., Redmond, WA, USA
fYear :
2005
fDate :
28 June-1 July 2005
Firstpage :
368
Lastpage :
377
Abstract :
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet. Resource hiding is a powerful stealth technique commonly used by malware to evade detection by computer users and anti-malware scanners. In this paper, we focus on a subclass of malware, termed "ghostware", which hide files, configuration settings, processes, and loaded modules from the operating system\´s query and enumeration application programming interfaces (APIs). Instead of targeting individual stealth implementations, we describe a systematic framework for detecting multiple types of hidden resources by leveraging the hiding behavior as a detection mechanism. Specifically, we adopt a cross-view diff-based approach to ghostware detection by comparing a high-level infected scan with a low-level clean scan and alternatively comparing an inside-the-box infected scan with an outside-the-box clean scan. We describe the design and implementation of the Strider GhostBuster tool and demonstrate its efficiency and effectiveness in detecting resources hidden by real-world malware such as rootkits, Trojans, and key-loggers.
Keywords :
Internet; application program interfaces; data encapsulation; query processing; security of data; Internet; Strider GhostBuster tool; application programming interface; ghostware detection; inside-the-box infected scan; outside-the-box clean scan; real-world malware; resource hiding; stealth malware program; stealth software detection; Application software; Computer crime; Computer industry; Data structures; EPROM; Filtering; Internet; Operating systems; Software tools; Wood industry;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on
Print_ISBN :
0-7695-2282-3
Type :
conf
DOI :
10.1109/DSN.2005.39
Filename :
1467811
Link To Document :
بازگشت