Automatic discovery of parasitic malware

  • Authors:
  • Abhinav Srivastava;Jonathon Giffin

  • Affiliations:
  • School of Computer Science, Georgia Institute of Technology;School of Computer Science, Georgia Institute of Technology

  • Venue:
  • RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
  • Year:
  • 2010

Quantified Score

Hi-index 0.01

Visualization

Abstract

Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it often subverts the normal execution of benign processes by modifying their in-memory code images to include malicious activity. It is important to find not only maliciously-acting benign processes, but also the actual parasitic malware that may have infected those processes. In this paper, we present techniques for automatic discovery of unknown parasitic malware present on an infected system. We design and develop a hypervisor-based system, Pyrenée, that aggregates and correlates information from sensors at the network level, the network-to-host boundary, and the host level so that we correctly identify the true origin of malicious behavior. We demonstrate the effectiveness of our architecture with security and performance evaluations on a Windows system: we identified all malicious binaries in tests with real malware samples, and the tool imposed overheads of only 0%-5% on applications and performance benchmarks.