DocumentCode
669117
Title
Noninvasive detection of anti-forensic malware
Author
Guri, Mordechai ; Kedma, Gabi ; Sela, Tom ; Carmeli, Buky ; Rosner, Amit ; Elovici, Yuval
Author_Institution
Dept. of Inf. Syst. Eng., Ben-Gurion Univ., Beer-Sheva, Israel
fYear
2013
fDate
22-24 Oct. 2013
Firstpage
1
Lastpage
10
Abstract
Modern malicious programs often escape dynamic analysis, by detecting forensic instrumentation within their own runtime environment. This has become a major challenge for malware researchers and analysts. Current defensive analysis of anti-forensic malware often requires painstaking step-by-step manual inspection. Code obfuscation may further complicate proper analysis. Furthermore, current defensive countermeasures are usually effective only against anti-forensic techniques which have already been identified. In this paper we propose a new method to detect and classify anti-forensic behavior, by comparing the trace-logs of the suspect program between different environments. Unlike previous works, the presented method is essentially noninvasive (does not interfere with original program flow). We separately trace the flow of instructions (Opcode) and the flow of Input-Output operations (IO). The two dimensions (Opcode and IO) complement each other to provide reliable classification. Our method can identify split behavior of suspected programs without prior knowledge of any specific anti-forensic technique; furthermore, it relieves the malware analyst from tedious step-by-step inspection. Those features are critical in the modern Cyber arena, where rootkits and Advanced Persistent Threats (APTs) are constantly adopting new sophisticated anti-forensic techniques to deceive analysis.
Keywords
input-output programs; invasive software; system monitoring; APT; Cyber arena; Opcode; advanced persistent threats; anti forensic malware defensive analysis; code obfuscation; dynamic analysis; forensic instrumentation detection; input-output operations; malicious programs; noninvasive anti forensic malware detection; trace-log comparison; Forensics; Hardware; Malware; Monitoring; Runtime; Software; Virtual machining;
fLanguage
English
Publisher
ieee
Conference_Titel
Malicious and Unwanted Software: "The Americas" (MALWARE), 2013 8th International Conference on
Conference_Location
Fajardo, PR
Print_ISBN
978-1-4799-2534-6
Type
conf
DOI
10.1109/MALWARE.2013.6703679
Filename
6703679
Link To Document