Hybrid analysis and control of malware

  • Authors:
  • Kevin A. Roundy;Barton P. Miller

  • Affiliations:
  • Computer Sciences Department, University of Wisconsin;Computer Sciences Department, University of Wisconsin

  • Venue:
  • RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ. The most prevalent of these techniques are code unpacking, code overwriting, and control transfer obfuscations. We simplify the analyst's task by analyzing the code prior to its execution and by providing the ability to selectively monitor its execution. We achieve pre-execution analysis by combining static and dynamic techniques to construct control- and data-flow analyses. These analyses form the interface by which the analyst instruments the code. This interface simplifies the instrumentation task, allowing us to reduce the number of instrumented program locations by a hundred-fold relative to existing instrumentation-based methods of identifying unpacked code. We implement our techniques in SD-Dyninst and apply them to a large corpus of malware, performing analysis tasks such as code coverage tests and call-stack traversals that are greatly simplified by hybrid analysis.