A Toolkit for Detecting and Analyzing Malicious Software

  • Authors:
  • Michael Weber;Matthew Schmid;Michael Schatz;David Geyer

  • Affiliations:
  • -;-;-;-

  • Venue:
  • ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present PEAT: The Portable ExecutableAnalysis Toolkit. It is a software prototype designed to providea selection of tools that an analyst may use in orderto examine structural aspects of a Windows Portable Executable(PE) file, with the goal of determining whethermalicious code has been inserted into an application aftercompilation. These tools rely on structural features ofexecutables that are likely to indicate the presence of insertedmalicious code. The underlying premise is that typicalapplication programs are compiled into one binary, homogeneousfrom beginning to end with respect to certainstructural features; any disruption of this homogeneity isa strong indicator that the binary has been tampered with.For example, it could now harbor a virus or a Trojan horseprogram. We present our investigation into structural featureanalysis, the development of these ideas into the PEATprototype, and results that illustrate PEAT's practical effectiveness.