Locating executable fragments with Concordia, a scalable, semantics-based architecture

  • Authors:
  • Jason M. Carter

  • Affiliations:
  • Cyber Warfare Research Team, Oak Ridge National Laboratory, Oak Ridge, TN

  • Venue:
  • Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The amount of digital evidence that must be processed by forensic tools and analysts is growing rapidly. This makes automated analysis a critical activity; an activity where continuous improvement is crucial. Concordia is a platform for investigating code semantics. One of Concordia's functions is identification of unknown code fragments; attempting to elucidate the possible objectives and origination of this type of evidence is our ultimate goal. Here we provide a synopsis of a method that identifies and locates code fragments using n-gram and semantics-based features and a k nearest neighbors classifier. Our objective is to identify a set of candidate files that may contain the unknown and supply additional details to isolate it within this set. To accomplish this task, Concordia uses the MapReduce model to process a large set of invariants to provide forensic experts a more efficient and automated way to produce solid intelligence about a growing body of evidence.