dAnubis: dynamic device driver analysis based on virtual machine introspection

  • Authors:
  • Matthias Neugschwandtner;Christian Platzer;Paolo Milani Comparetti;Ulrich Bayer

  • Affiliations:
  • Secure Systems Lab, Vienna University of Technology;Secure Systems Lab, Vienna University of Technology;Secure Systems Lab, Vienna University of Technology;Secure Systems Lab, Vienna University of Technology

  • Venue:
  • DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operating system kernel provides an extremely powerful tool. Kernel-level code can introduce hard to detect backdoors, provide stealth by hiding files, processes or other resources and in general tamper with operating system code and data in arbitrary ways. Under Windows, kernel-level malicious code typically takes the form of a device driver. In this work, we present dAnubis, a system for the real-time, dynamic analysis of malicious Windows device drivers. dAnubis can automatically provide a high-level, human-readable report of a driver's behavior on the system. We applied our system to a dataset of over 400 malware samples. The results of this analysis shed some light on the behavior of kernel-level malicious code that is in the wild today.