• DocumentCode
    669117
  • Title

    Noninvasive detection of anti-forensic malware

  • Author

    Guri, Mordechai ; Kedma, Gabi ; Sela, Tom ; Carmeli, Buky ; Rosner, Amit ; Elovici, Yuval

  • Author_Institution
    Dept. of Inf. Syst. Eng., Ben-Gurion Univ., Beer-Sheva, Israel
  • fYear
    2013
  • fDate
    22-24 Oct. 2013
  • Firstpage
    1
  • Lastpage
    10
  • Abstract
    Modern malicious programs often escape dynamic analysis, by detecting forensic instrumentation within their own runtime environment. This has become a major challenge for malware researchers and analysts. Current defensive analysis of anti-forensic malware often requires painstaking step-by-step manual inspection. Code obfuscation may further complicate proper analysis. Furthermore, current defensive countermeasures are usually effective only against anti-forensic techniques which have already been identified. In this paper we propose a new method to detect and classify anti-forensic behavior, by comparing the trace-logs of the suspect program between different environments. Unlike previous works, the presented method is essentially noninvasive (does not interfere with original program flow). We separately trace the flow of instructions (Opcode) and the flow of Input-Output operations (IO). The two dimensions (Opcode and IO) complement each other to provide reliable classification. Our method can identify split behavior of suspected programs without prior knowledge of any specific anti-forensic technique; furthermore, it relieves the malware analyst from tedious step-by-step inspection. Those features are critical in the modern Cyber arena, where rootkits and Advanced Persistent Threats (APTs) are constantly adopting new sophisticated anti-forensic techniques to deceive analysis.
  • Keywords
    input-output programs; invasive software; system monitoring; APT; Cyber arena; Opcode; advanced persistent threats; anti forensic malware defensive analysis; code obfuscation; dynamic analysis; forensic instrumentation detection; input-output operations; malicious programs; noninvasive anti forensic malware detection; trace-log comparison; Forensics; Hardware; Malware; Monitoring; Runtime; Software; Virtual machining;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on
  • Conference_Location
    Fajardo, PR
  • Print_ISBN
    978-1-4799-2534-6
  • Type

    conf

  • DOI
    10.1109/MALWARE.2013.6703679
  • Filename
    6703679