Dynamic Binary Instrumentation-Based Framework for Malware Defense

  • Authors:
  • Najwa Aaraj;Anand Raghunathan;Niraj K. Jha

  • Affiliations:
  • Department of Electrical Engineering, Princeton University, Princeton, USA NJ 08544;NEC Laboratories America, Princeton, NJ 08540;Department of Electrical Engineering, Princeton University, Princeton, USA NJ 08544

  • Venue:
  • DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malware is at the root of a large number of information security breaches. Despite widespread effort devoted to combating malware, current techniques have proven to be insufficient in stemming the incessant growth in malware attacks. In this paper, we describe a tool that exploits a combination of virtualized (isolated) execution environments and dynamic binary instrumentation (DBI) to detect malicious software and prevent its execution. We define two isolated environments: (i) a Testingenvironment, wherein an untrusted program is traced during execution using DBI and subjected to rigorous checks against extensive security policies that express behavioral patterns of malicious software, and (ii) a Realenvironment, wherein a program is subjected to run-time monitoring using a behavioral model (in place of the security policies), along with a continuous learning process, in order to prevent non-permissible behavior.We have evaluated the proposed methodology on both Linux and Windows XP operating systems, using several virus benchmarks as well as obfuscated versions thereof. Experiments demonstrate that our approach achieves almost complete coverage for original and obfuscated viruses. Average execution times go up to 28.57X and 1.23X in the Testingand Realenvironments, respectively. The high overhead imposed in the Testingenvironment does not create a severe impediment since it occurs only once and is transparent to the user. Users are only affected by the overhead imposed in the Realenvironment. We believe that our approach has the potential to improve on the state-of-the-art in malware detection, offering improved accuracy with low performance penalty.