Design issues of an isolated sandbox used to analyze malwares

  • Authors:
  • Shinsuke Miwa;Toshiyuki Miyachi;Masashi Eto;Masashi Yoshizumi;Yoichi Shinoda

  • Affiliations:
  • National Institute of Information and Communications Technology, Information Security Research Center, Koganei, Tokyo, Japan and Japan Advanced Institute of Science and Technology, Internet Resear ...;National Institute of Information and Communications Technology, Hokuriku Research Center, Nomi-city, Ishikawa, Japan and Japan Advanced Institute of Science and Technology, Internet Research Cent ...;National Institute of Information and Communications Technology, Information Security Research Center, Koganei, Tokyo, Japan;National Institute of Information and Communications Technology, Hokuriku Research Center, Nomi-city, Ishikawa, Japan and Japan Advanced Institute of Science and Technology, School of Information ...;Natl. Inst. of Inf. and Comm. Techn., Inf. Sec. Res. Center, Tokyo, Japan and Natl. Inst. of Inf. and Comm. Techn., Hokuriku Res. Center, Nomi-city, Ishikawa, Japan and Japan Adv. Inst. of Sci. an ...

  • Venue:
  • IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recent viruses, worms, and bots, called malwares, often have anti-analysis functions such as mechanisms that confirm connectivity to certain Internet hosts and detect virtualized environments. We discuss how malwares can be kept alive in an analyzing environment by disabling their anti-analyzing mechanisms. To avoid any impacts to/from the Internet, we conclude that analyzing environments should be disconnected from the Internet but must be able to make malwares believe that they are connected to the real Internet. We also conclude that, for executing environments to analyze anti-virtualization malwares, they should not be virtualized but must be as easily reconstructable as a virtualized environment. To reconcile these cross-purposes, we propose an approach that consists of a mimetic Internet and a malware incubator with swappable actual nodes. We implemented a prototype system and conducted an experiment to test the adequacy of our approach.