DocumentCode :
624836
Title :
Patterns of a cooperative malware analysis workflow
Author :
Plohmann, D. ; Eschweiler, Sebastian ; Gerhards-Padilla, Elmar
Author_Institution :
Cyber Defense Res. Group, Fraunhofer FKIE, Bonn, Germany
fYear :
2013
fDate :
4-7 June 2013
Firstpage :
1
Lastpage :
18
Abstract :
In recent years, an ever-increasing number of IT security incidents have been observed, often involving malicious software. In order to cope with the threat posed, it is essential to have a structured analysis workflow for assessment and mitigation. In this paper, we give a thorough explanation of the malware analysis workflow specified and employed by our team of analysts. It was deducted from observed work patterns and best practices with a strong focus on enabling collaboration, i.e. analyses conducted by multiple analysts in parallel in order to achieve a speed-up. The proposed workflow starts at the point where one or more malware samples have already been extracted. It consists of four phases as a whole, each with its own goals, constraints, and abort conditions. The first phase aims at gaining an overview of the current situation and specifying goals of the analysis and their respective priorities. The second phase features a preliminary analysis used to sharpen the picture of the threat, using methods of Open Source Intelligence (OSINT) and automated tools in order to obtain a quick assessment enabling first mitigation. In addition, one objective is to facilitate and prepare a more granular dissection of the malware sample, e.g. by unpacking and deobfuscation. The third phase comprises an in-depth analysis relying heavily on reverse engineering of selected parts of the malware. The selection may be influenced by earlier findings or focus on prominent aspects like nesting, functionality, or communication protocols. The final phase builds upon the results of the preceding phases, leading to tailored mitigation concepts for the specimen analysed. For each of the proposed phases, we give an overview of potential key tools, e.g. helping to gain information or improve collaboration. On a higher level, we highlight challenges to cooperative analysis and our approach to handle them. In this regard, the workflow contains adoptions of principles known from agile soft- are development methodologies. For example, Scrum is used for management of tasks and coordination, aiding the creation of a reproducible and reliable chain of results.
Keywords :
groupware; invasive software; reverse engineering; software prototyping; IT security incident; OSINT; agile software development; cooperative malware analysis workflow; malicious software; open source intelligence; reverse engineering; Best practices; Charge coupled devices; Collaboration; Documentation; Inspection; Malware; Software; cooperation; malware analysis; workflow;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cyber Conflict (CyCon), 2013 5th International Conference on
Conference_Location :
Tallinn
ISSN :
2325-5366
Print_ISBN :
978-1-4799-0450-1
Type :
conf
Filename :
6568385
Link To Document :
بازگشت