Detecting VM-Aware Malware by Discovering Divergence Points

碩士 === 國立交通大學 === 網路工程研究所 === 98 === Virtualized execution environment has been demonstrated as an effective mechanism for malware behavior analysis. To be analysis-resistant, evolved malware are often equipped with VM (Virtual Machine)-detection capabilities. By identifying its execution environmen...

Full description

Bibliographic Details
Main Authors: Shih, Fan-Syun, 施汎勳
Other Authors: 謝續平
Format: Others
Language:en_US
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/51220913784720768957
id ndltd-TW-098NCTU5726034
record_format oai_dc
spelling ndltd-TW-098NCTU57260342016-04-18T04:21:39Z http://ndltd.ncl.edu.tw/handle/51220913784720768957 Detecting VM-Aware Malware by Discovering Divergence Points 利用程式分歧點尋找以偵測虛擬機器感知的惡意軟體 Shih, Fan-Syun 施汎勳 碩士 國立交通大學 網路工程研究所 98 Virtualized execution environment has been demonstrated as an effective mechanism for malware behavior analysis. To be analysis-resistant, evolved malware are often equipped with VM (Virtual Machine)-detection capabilities. By identifying its execution environment, such VM-aware malware could hide their real intention to circumvent VM-based analysis. In this paper, a novel approach was proposed to cope with this problem. By comparing execution coverage of the suspicious sample run in different virtual machines for multiple times, divergence points caused by certain virtualized environment can be discovered. Such divergences are extremely suspicious since a benign program does not distinguish its host environment. To evaluate the effectiveness of our system, four VM-aware malware programs and seven VM detection samples were analyzed. The experiment results showed that our system captures all divergence points caused by these VM detections. Discovering these divergence points are most valuable for not only identifying malware but also amending existing VM-based analysis environment. 謝續平 2010 學位論文 ; thesis 42 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 網路工程研究所 === 98 === Virtualized execution environment has been demonstrated as an effective mechanism for malware behavior analysis. To be analysis-resistant, evolved malware are often equipped with VM (Virtual Machine)-detection capabilities. By identifying its execution environment, such VM-aware malware could hide their real intention to circumvent VM-based analysis. In this paper, a novel approach was proposed to cope with this problem. By comparing execution coverage of the suspicious sample run in different virtual machines for multiple times, divergence points caused by certain virtualized environment can be discovered. Such divergences are extremely suspicious since a benign program does not distinguish its host environment. To evaluate the effectiveness of our system, four VM-aware malware programs and seven VM detection samples were analyzed. The experiment results showed that our system captures all divergence points caused by these VM detections. Discovering these divergence points are most valuable for not only identifying malware but also amending existing VM-based analysis environment.
author2 謝續平
author_facet 謝續平
Shih, Fan-Syun
施汎勳
author Shih, Fan-Syun
施汎勳
spellingShingle Shih, Fan-Syun
施汎勳
Detecting VM-Aware Malware by Discovering Divergence Points
author_sort Shih, Fan-Syun
title Detecting VM-Aware Malware by Discovering Divergence Points
title_short Detecting VM-Aware Malware by Discovering Divergence Points
title_full Detecting VM-Aware Malware by Discovering Divergence Points
title_fullStr Detecting VM-Aware Malware by Discovering Divergence Points
title_full_unstemmed Detecting VM-Aware Malware by Discovering Divergence Points
title_sort detecting vm-aware malware by discovering divergence points
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/51220913784720768957
work_keys_str_mv AT shihfansyun detectingvmawaremalwarebydiscoveringdivergencepoints
AT shīfànxūn detectingvmawaremalwarebydiscoveringdivergencepoints
AT shihfansyun lìyòngchéngshìfēnqídiǎnxúnzhǎoyǐzhēncèxūnǐjīqìgǎnzhīdeèyìruǎntǐ
AT shīfànxūn lìyòngchéngshìfēnqídiǎnxúnzhǎoyǐzhēncèxūnǐjīqìgǎnzhīdeèyìruǎntǐ
_version_ 1718226974999052288