nEther: in-guest detection of out-of-the-guest malware analyzers

  • Authors:
  • Gábor Pék;Boldizsár Bencsáth;Levente Buttyán

  • Affiliations:
  • Budapest University of Technology and Economics;Budapest University of Technology and Economics;Budapest University of Technology and Economics

  • Venue:
  • Proceedings of the Fourth European Workshop on System Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malware analysis can be an efficient way to combat malicious code, however, miscreants are constructing heavily armoured samples in order to stymie the observation of their artefacts. Security practitioners make heavy use of various virtualization techniques to create sandboxing environments that provide a certain level of isolation between the host and the code being analysed. However, most of these are easy to be detected and evaded. The introduction of hardware assisted virtualization (Intel VT and AMD-V) made the creation of novel, out-of-the-guest malware analysis platforms possible. These allow for a high level of transparency by residing completely outside the guest operating system being examined, thus conventional in-memory detection scans are ineffective. Furthermore, such analyzers resolve the shortcomings that stem from inaccurate system emulation, in-guest timings, privileged operations and so on. In this paper, we introduce novel approaches that make the detection of hardware assisted virtualization platforms and out-of-the-guest malware analysis frameworks possible. To demonstrate our concepts, we implemented an application framework called nEther that is capable of detecting the out-of-the-guest malware analysis framework Ether [6].