A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
|
|
|
- Derick Carr
- 9 years ago
- Views:
Transcription
1 A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS Waqas Aman Norwegian Information Security Laboratory, Gjøvik University College, Norway ABSTRACT Malware writers have employed various obfuscation and polymorphism techniques to thwart static analysis approaches and bypassing antivirus tools. Dynamic analysis techniques, however, have essentially overcome these deceits by observing the actual behaviour of the code execution. In this regard, various methods, techniques and tools have been proposed. However, because of the diverse concepts and strategies used in the implementation of these methods and tools, security researchers and malware analysts find it difficult to select the required optimum tool to investigate the behaviour of a malware and to contain the associated risk for their study. Focusing on two dynamic analysis techniques: Function Call monitoring and Information Flow Tracking, this paper presents a comparison framework for dynamic malware analysis tools. The framework will assist the researchers and analysts to recognize the tool s implementation strategy, analysis approach, system-wide analysis support and its overall handling of binaries, helping them to select a suitable and effective one for their study and analysis. KEYWORDS Malware Analysis, Functional Call Monitoring, Information Flow Tracking, System Call, Hooks. 1. INTRODUCTION The internet has evolved exponentially since it was first launched in It has grown increasingly from a four node communication model to a highly interconnected and sophisticated network providing more and more services inheriting boundless benefits. The marketplace of products and services are broadening on a global level, new ways of social interactions are established and online banking has given new dimensions to banking operations. However, these benefits have also motivated the people with malicious intents who are looking for any opportunities to fulfill their objectives. Malware is one of the key mediums to furnish these malicious intents. Legitimate users are protected from such malicious codes by the security vendors who provide them a software, antivirus, which identify and analyze these codes and alert the user accordingly. Typically, antivirus is equipped with a signature database which is used in the matching process to identify potential known or common threats. Malware analyst obtains a piece of suspected code and analyzes it to find whether it is harmful or not. When a threat in a code is confirmed, the analyst looks for a particular pattern of the threat and develops a signature for that code (malware) and is added to the signature database to confront a particular malware in the future. This manual process though seems trivial and does the job but is subjected to time consumption and errors as there exist a number of variant of the same code. Statistics shows that anti-malware vendors are experiencing thousands of malicious codes each day. McAfee, for instance, received more than 20,000 malware samples of mobile alone in 2012 [1]. According to NQ Mobile, mobile malwares DOI : /ijnsa
2 alone has grown up to 163% and has increased to more than in 2012 [2]. Hence there is a need to automate the process to support quick, effective and timely analysis of such samples. Typically, two methods are used to perform malware analysis; Static and Dynamic analysis. The distinguishing ground between the two techniques is that the dynamic analysis observes a malicious behavior while a sample code is executed whereas; the static approach does not execute the code. Though, they differ in the techniques used, a number of methods and tools were proposed to serve the same objectives of malware analysis. In this paper, two most common techniques used in dynamic malware analysis: Function call monitoring and Information Flow Tracking (IFT) will be conversed. Understanding these two techniques gives a general and holistic picture of a malware executable. Functional Call Monitoring aims to investigate the functional behavior and IFT provides and understanding of what data a malicious binary is interested in during execution. Thus, provides the analyst a fair idea of: for what reasons does a malware misbehave. However, analyzing a malware has turned into a crucial as well as an essential skill for security professionals and forensics investigators. Malware analysis not only enables an analyst to realize the malevolent code objectives but also gives an understanding of the evolving trend of a malware thus providing an analyst a tool to enrich the detection techniques. Due to the diversity of concept and strategies used in the implementation of these methods and tools, security researchers and analyst finds it difficult to select an appropriate tool for their investigations. Therefore, a framework is presented that aims to provide a platform to identify and understand the techniques that various tools offer to an analyst and the strategies they implement in accomplishing dynamic malware analysis thus helping them to select an optimum method or tool for their investigations. The rest of the article is organized as follow: In section 2, an understanding of malware analysis will be highlighted, and preliminaries of Function Call monitoring and Information Flow Tracking will be conversed. In section 3, the proposed framework is presented. A summary of selected tools to be analysed and compared will be briefly described in section 4. Section 5, will provide a comparative analysis of the discussed tools and finally, the paper will be concluded in section MALWARE ANALYSIS Malware is a piece of software or program that deliberately fulfill the malicious attempts of an attacker. Malware comes in many forms with different objectives. The common terms used to classify different types of malwares are Trojan, worm and virus, etc. [3]. Traditionally, they were developed either for fun factors to show one's capabilities or for highlighting weaknesses within a system. However, today, these motivations have gone to the highest level of treachery. Now we can see a spectrum of motivation ranging from personal to national level interest and a whole new underground economy is based on malwares these days [4]. Stuxnet [5] is one of the latest pictures of such motivations. Malwares are propagated using numerous infection vectors such as exploiting vulnerability on a client system, through an open or vulnerable network service, using removable devices [5, 6] or through social engineering. To combat against malwares, systems are now equipped with antivirus programs. Most of the antivirus programs consist of a scanner and a signature database. The scanner matches file on the user system and matches them against the available signatures. An alert is generated and the user is informed when a match is found. Typically, two standard approaches are used to analyze the behavior of a malicious program. Dynamic analysis is a set of methods that are used to understand the behavior of a program during its execution while static analysis is used to investigate a program without executing it. The following subsections will elaborate static analysis and the shortcomings associated with it. 64
3 2.1. Static Analysis Analyzing a program to observe its behavior by investigating it without execution is commonly known as static analysis. It can be performed in numerous ways depending upon the availability of the code and its representation. Static analysis can assist in evaluating the memory errors and can improve the correctness of a program execution if it source code is available [7, 8]. It can also be used to inspect a binary executable with different tools [9]. Static analysis can be prompted before or after dynamic analysis or can be done as a standalone procedure. Sometimes it is performed to see if the analysts have missed anything suspicious after the dynamic analysis. And is performed pre-dynamic analysis to analyze and understand the behavior prior to the code execution in a live environment Shortcomings of Static Analysis Because source code of most of the programs is not readily available makes the static analysis approach harder to combat the malicious programs thus reduces its application. Analyzing binaries with static approaches have inherited complications and challenges. Some of the malwares with strong evasion and obfuscation techniques such as the presence of Opaque Constants make the disassembling of a binary executable ambiguous due to which the resulting code cannot be analyzed precisely [10]. Disassembling remains the essential part of the static analysis of binaries which can be easily made ambiguous by simple obfuscation measures. Such obfuscation techniques obscure the program flow, making the variables inaccessible and disable the tracking of values stored in a register. These limitations of the static approach motivate the development of analysis techniques that can overcome the mentioned code evasions and transformations and to analyze a malicious program accurately and reliably Dynamic Malware Analysis Dynamic analysis is the process of executing malware in a monitored environment to observe its behaviors [11]. While a monitored program executes, it provide a detailed information readily such as URL accessed, files created and accessed, information transferred, registry keys creation and so forth. In this section, a detailed discussion will be made on two most common techniques used in dynamic analysis: Information Flow Tracking and Function Call Monitoring. Furthermore, a description of various approaches and concepts used to accomplish these techniques will also be elaborated. The objective of the underlying discussion is to understand two vital aspects of analyzing a malicious program i.e. their functional behavior and the data or information they are interested in while they execute Information Flow tracking Information Flow Tracking (IFT) approaches are used to monitor programs from the perspective of how the program processes the data. During the analysis, suspected or interested data is tainted or labeled before it is processed and its propagation is then observed when the data is processed. Because of the tainting data, information flow tracking is also termed as Taint Analysis [12]. In [13], the author illustrates information flow tracking process with a simple example reviewed below in table 1. Considered a stack location, z, is an unsafe location. A received data, x, from the network is considered suspicious and is tainted. During processing, x is copied to another location, y. Now during program execution if the program jumps to the already tagged location z, an alarm will be raised indicating a malicious activity. 65
4 Table1. Simple Information Flow Tracking Program Execution.. Received (&x); y = x;.. Jmp z; Information Flow Tracking Tag(z) = 1 Suspicious location is tagged unsafe Tag(x) = 1 Unsafe data tagged Tag(y) = Tag(x).. Raise Alarm, as z is already tagged as unsafe & suspicious Some of the key concepts used in the process of IFT analysis are described below: Tainted Sources and Destinations: Taint sources are the components of an Information Flow Tracking system that labels interested or suspicious data in the system. They taint the data and give them as an input to the system. Tainted destinations, on the other hand, are the elements which respond to a tainted data introduced by the taint sources in a tailored mechanism. Responses can either be triggering another source or raising an alert. Direct Tainted Data: As the name implies, direct tainted data refers to labelling an operand directly. The common rule of data tainting is that when a tainted source value is moved or copied to another operand, the destination operand is also tainted [14]. However, an IFT system may contain more than one direct tainted operands involved in a single (or multiple) instruction(s) with distinct labels as depicted in table 2. A guideline should be maintained that direct how these tainted operand should be handled. For example, the most suspicious or interested operand can be monitored over the other or they can be analyzed in a combined manner under a common label. Table 2. Direct Data Tainting Program Execution y = x; y = y + x; Information Flow Tracking Tag(y) = Tag(x) Direct tainted data with distinct tags Tag(y) = Tag(x) + Tag(x) Direct tainted data with distinct tags in an arithmetic operation Tainting Addresses: Pointer or address tainting is used when the information flow tracking system is used to observe non-control data exploits or analyzing sensitive information leakage and is done by generating an address using a tainted data [15]. When an address A is tainted, it is detected as a malicious activity if A is de-referenced during the program execution. Consider the example in table 3 below: Table 3. Tainting Addresses Program Execution x = 0; A = &x; A = 1; Information Flow Tracking Tag(y) = Tag(x) Direct tainted data with distinct tags Tainted Address A generated using tainted value X Tainted Address A is de-referenced Generate Alarm Control Dependencies: Besides data and address tainting, information flow tracking can also be performed using control flow tainting. For instance, an instruction X is control dependent on instruction B, if B controls the execution of A [15]. An illustration of control-flow tainting is provided in table 4. It implies that an address or data can only be tracked if another tainted operand on which its execution is dependent is also processed by the system. 66
5 Table 4. Control Flow Tracking Program Execution Information Flow Tracking If (A == 0) { B == 1; } T ag(b) T ag(a) = 0 Taint Policy: Taint policy is a set of rules that direct how a taint analysis should be carried out within the information flow tracking system and covers three aspects of taint analysis; taint Introduction, Propagation and Checking [15]. Taint introduction rules direct how taint should be introduced to the system, propagation specifies how taints statuses are to be updated for data derived from tainted or untainted operands and checking is performed to validate the taint status and the corresponding action to be taken. Over and Under-tainting: These are the two types of errors that can be experienced during information flow tracking analysis [15]. Overtainiting occurs when the system marks a data as tainted when it is not derived from a tainted source. Undertainting occurs when the analysis process misses a value to be tainted in the information flow tainting Function Call Monitoring A function is a subroutine or a code block in a program that execute specific operations. They are used whenever a code or task is repeated. This property makes functions reusable and easy to maintain if changes are required for a particular procedure. Functions are designed in an abstract manner with more semantic oriented approach rather than focusing on the implementation details which make it adaptable for many platforms. From the analysis perspective, such abstraction provides an understanding of the overall behavior of a program. A function call is a simple command which invokes a function by calling its name. Functions are usually monitored by intercepting the calls made to it. The process of hooking is used to capture the function calls. The monitored program is operated in such a way that whenever a call to a function is made, the hook function is also invoked. Hook is a function itself which implements the analysis procedure and performs tasks like logging target program execution, observes intermediary function calls and analyzing various inputs and outputs. The get an understanding of dynamic analysis in the context of functions and function calls, the under mention terminologies are explained to recognize how functions and function calls are triggered, the tasks they perform and the level they execute on. Application Programming Interface: API is a set of programming specifications that perform various functionalities. Operating Systems provide various API libraries of object classes, functions, data structures, and variables that are grouped together to accomplish common functions. They are offered at different layers of operating system. Windows Cryptography API [16], for instance, focuses on the provision of constants, command-line tools and functions, etc. required by the cryptography and certificate services used in a Window operating system. System Calls: Operating Systems provides two modes of program execution: User and Kernel mode. User programs such as word processing, imaging applications and browsing, etc. are executed in the user mode while the operating system runs its own programs in kernel mode. User mode processes don t have a direct access to the system level which can only be accessed by kernel mode process [17]. However, in order to perform various tasks such as creating a file on disk, a user mode process have to call a 67
6 system level process. In operating systems, this is facilitated through special APIs called System Calls. The user mode switches to the kernel mode when a system call is triggered and the request can be executed then in a privileged mode at system level. Although there are some kernel level malwares which gain privileges to extract sensitive information such as Rootkits [18] however, most of the malwares infects user mode processes and make their way to the privileged kernel mode. Another way of invoking system calls in Windows operating systems are the Windows Native APIs. However, they differ from the usual managed APIs (discussed earlier) which remain the same in every operating while the native APIs varies from one service pack to another [19]. Some user mode processes use native APIs as a communication medium between higher level APIs and the system calls. Generally, a legitimate user mode application connects to the kernel level (system calls) through Windows API however; a malware may bypass the managed API layer triggering the native APIs directly to execute malicious code at the kernel level. As a result, the dynamic analysis tools which use API hooking to observe malicious behavior skip these malwares unnoticed. Hooking: API hooking enables the analyst to track specific behavioral elements of the program execution such as intermediary calls and parameters used in a function. Hooking to native interfaces can provide a truer and detail behavioral analysis of a malicious function and provide an insight to reveal suspicious activities bypassing the managed APIs. From the context of implementation, hooking can be performed in a variety of ways to circumvent malicious code from its execution. The simple way of hooking onto a function is to insert the hook function appropriately into the code, provided that the source code is readily available. [20] provides a set of function in GNU Compiler Collection (GCC) to support function hooking using flags during code compilation. Binary analysis mechanisms, for instance, [18], can be used to detect and analyze functional behavior, if binary executable are in hand. Windows operating systems support function hooking using the Detours Library [21]. It implements function hooking whenever a monitored function is called by diverting the control flow to a hook. When the hook function is initialized for analysis, it then calls in monitored function itself. Another way to achieve function hooking is debugging. It allows the analyst to insert breakpoints into the code at defined functions to observe its behavior. A number of techniques to debug Windows programs can be found at [22]. Breakpoints give a full control at the debugger level to access various process components for analysis. The Trace: The resulting product of function hooking is termed as a function trace. It is more like an analysis report containing rich information such as the parameters accessed and processed and the extended functions called by the monitored function. However, a raw trace file may be very complicated to understand and analyze. Different tools and methods are available which sort the trace information in a required semantic representation. Malicious and legitimate behavior of a function can be reviewed by using a graph where the differences between the graphs can show the presence of malicious activity [23]. 3. PROPOSED FRAMEWORK This section details the key concepts and strategies based on which the proposed framework is developed. They are necessary to understand or analyse dynamic malware analysis tools Analysis Level and Environment Analysis system can be implemented at different level of an operating system. Its design assessment depends upon the type of malwares under investigation and the level of information 68
7 extraction. Kernel mode analysis can extract rich information such as the systems calls and the intermediary Native APIs called. As a privileged mode operation, kernel mode analysis can hide its execution from the user level malwares [18]. On the other hand, user mode analysis can provide a detail description of the managed API calls and the invoked functions. However, it cannot retrieve the information on the invoked native APIs and corresponding system calls. Analyzing malwares in native environment can lead to infections therefore analysis is done in a protected environment to analyze the monitored programs thoroughly without any risk of infection. Analysis can be performed in an emulated environment which enables an analyst to execute a binary program without being infected. The process is usually carried in a Sandbox which allows a program to be executed in an environment where all systems components such as I/O devices, CPU, memory and network services are emulated [24]. Similar kind of approach is the Virtual Machine Monitoring (VMM) where analysis is carried out in a virtual, isolated machine that runs on a real (host) system Monitored Process A vital property of an analysis tool is its capacity to monitor to multiple processes at the same time. Most of the analysis techniques observe a single process however; malwares usually tend to be dependent on other actions (processes) or conditions to be triggered such as logic bombs [3]. Monitoring multiple processes enables an analyst to perform an in-depth investigation of activities and execution paths executed by a malware. Thus, in order to evaluate an analysis tool we can breakdown the analysis to single, spawned (where a monitored process activates a child process) and system-wide process monitoring Analysis Method Analysis techniques refer to the investigation methods which are used or available in a particular tool. The two important analysis techniques focused this paper are the function call monitoring and IFT. However, the implementation or analysis level of a tool restricts an analyst to investigate a malware by using only few analysis methods. For instance, if an analysis tool is implemented in user mode, an analyst cannot observe or monitor the system calls or the intermediary native APIs. Thus as a thumb rule, tools incorporating more analysis methods and options provides a better analysis environment and produce positive as well as detailed results Unpacking the Binaries Packing is a process in which a binary executable is packed in a transformed version of a program, which has a different syntax but have the same semantics. This technique is now used by most of the malware writers to hide the malware semantics from an analysis tool using different obfuscation and encryption measures. An unpacking module is appended with the packed malware, which is activated in the memory of the victim s system thus leaving no trace on the secondary memory. Though, analysis can be performed after the malware is unpacked but it is more advantageous for the analysts to perform analysis while it is packed as it enables them to understand the unpacking techniques used. Various techniques such as Reconstruction [25], Write xor Execute (W X) Policy [26] or detecting packer with packer signature database is used to handle packed binaries. 4. TOOLS AND TECHNIQUES This section presents a summary of eight most cited tools and techniques that incorporate Function Call monitoring and IFT to approach dynamic malware analysis. Furthermore, a brief 69
8 overview will be provided on how individual tools address the features and strategies discussed in section 3. Panorama [27] is a comprehensive malware analysis tool which implements data and address tainting techniques of IFT. The given system provides a holistic system-wide investigation in an emulated environment. An informationtrace in the form of a taint graph is presented during the analysis of a monitored program and contains information like network packets payload, function parameters and data accessed during the execution. While a program is emulated, the analysis is performed at the kernel level to intercept the system calls and APIs are invoked. The system designers, however, didn t address the notion of unpacking the binaries in this tool. CWSandbox [28] is a Function Call monitoring tool that supports both user and kernel mode behavior analysis to observe calls made to the APIs and systems calls. A hook function, that implements a monitoring function, is invoked each time when an API is called. A control process is defined which monitors and report the analysis whenever a hook function is called. This enables the analyst to monitor and analyze the child processes that can be launched by a malware. To increase the performance of the analysis process, a custom DLL is compiled before the analysis process in order to have a quick access to the required hook functions. API and systems calls are written into a trace file that provides a top-bottom view of functions calls made during the execution. Ether [29] uses hardware virtualization techniques to monitor functional behavior of a program on individual instruction level. A trap flag is setup when a monitored program is launched. This enables the analyst to debug the program s functional behavior as the trap flag is used as a breakpoint during execution. The presented technique can only retrieve system call information which is implemented using the SYSENTER instruction. The implemented flagging phenomenon also enables tracking and recording of program instructions resulting in reporting of rich information to the analyst detailing individual instruction execution. TQana [30], is an Internet Explorer browser plug-in that analyze the dynamic behavior of a Spyware. TQana can observe the functional behavior as well as the information trace of spyware execution. The analysis performed is emulated at the kernel level where the monitoring program has access to all the calls made. Tainting or IFT is implemented using the Navigate event of the web browser which introduce taints to the system whenever a URL is entered in the address bar, or a link is clicked on a web page. Furthermore, contents accessed by a web browser and bookmarks are also tainted. API and System call monitoring is implemented using the Component Object Model subsystem (COM). For future attacks, malwares like Rootkits and Spywares hook themselves to system APIs and is activated on desired events. This hooking is done in a stealthy mode to avoid detection. Hookfinder [31] is a tool that is used to identify and detect these bogus hooks, presenting the findings in a detailed report. Hookfinder is implemented in emulated environment where analysis is carried out with kernel mode privileges. Hook detection is done by monitoring the control flow of the system processing. The tool observes the data and address taints and whenever the control flow (instruction pointer) is diverted to an unexpected API or system call (or a tainted value in this case), it detects a hook and alerts the analyst. The analysis is done on a single-process level. The analysis report presented reflects the specific API or function to which a hook was attached and a trace of how the instruction pointer was manipulated. Norman Sandbox [32] is a functional call monitoring system which is implemented in a simulated environment where analysis is performed in the user space. It is designed to analyze worms and viruses which use network shares and as infection vectors. The authors argued that it can be used to analyse packed malware binaries as the infection is already contained in a simulated environment. However, they didn t provide any unpacking technique instead suggested that in 70
9 order to increase analysis performance, packers can be detected with known databases containing packer signatures. Moreover, it is advised to simulate all network services as some malware intends to use various network ports and services, for instance, SMB 137/138/445 in case of network sharing. If a read or write request to certain service is returned null, the malware might terminate its existence resulting the analysis to fail entirely. Justin [33] is a scheme to handle packed binaries. The theme of this model is that a malware can be detected immediately after the binary is unpacked by its unpacking routine so that it is readily available to be detected by any antimalware software. The scheme can be used as a plugin on the top of an AV which doesn t provide the analysis and detection of un-packer. The external antimalware software is activated once the Write xor Execute condition is detected as true in the memory. The scheme is based on two assumptions: i. Irrespective of the packing techniques used by a malware, the original binary will execute from the same memory address after it is unpacked. ii. After the unpacking, full control is given to the original packed binary. Logically, these two assumptions remain valid for most of the malwares. However, they can be seen as very strict rules and can be bypassed by malwares which evade detection techniques using multiple layers of packing. PolyUnpack [34] on the other hand is more focused on the un-packer execution. It observes the dynamic behavior of the un-packer execution using both static and dynamic analysis. The packed binary is disassembled and is analysed in a static approach while the packed binary is executed and is observed dynamically at each instruction level. Both the operations are done at the memory level. The packer code is identified by comparing the instruction trace in both the dissembled and the executed binaries. If, in either of the analysis the trace is not matched, it indicates the packed code is about to be unpacked. 5. COMPARATIVE ANALYSIS This section presents an analysis of the summarized tools as per the proposed framework detailed in section 3. The objective of this analysis is to provide the reader a clear idea of how the mentioned tools and techniques incorporate implementation strategies and the support they provide for function call monitoring and IFT analysis. A comparative analysis is shown in the table 5. It can be seen that most of the tools, Panorama, CWSandbox, TQana, HookFinder, Justin, have focused the kernel level implementation to get a detail understanding of the malware. Malware uses different APIs to call common system calls. They are more interested in system calls to achieve privilege access. APIs provide a medium to connect to them which implies that analysis concentration should be more focused on intercepting and analyzing system calls. This trend can be seen in the studied tools where all of them provide mechanisms to analyze the system calls. IFT is only offered in HookFinder, TQana and Panorama. However, the objective of performing information tainting is different. HookFinder implements IFT to detect the stealthy hooks within a system whereas, TQana and Panorama provide tainting techniques to monitor and analyze sensitive information leakage. 71
10 Strategies Panorama CW Sandbox Table 5. Comparative Analysis Ether TQana Hook finder Norman Justin Poly Unpack Mode User Kernel - - Environment Emulated Virtual Methods & Support API Hooking System Calls - - Packer Analysis Packer Reconstruction W X Policy Trace IFT - - Process Scope Single - Spawned System Wide CONCLUSION In this paper, two key techniques of dynamic analysis, IFT and Function Call Monitoring, were detailed. Due to the diversity of concepts and strategies associated with these techniques, it is hard to identify and select a suitable tool. A framework is presented which highlight the key attributes of interest in dynamic malware analysis and provides a general yet detailed enough reference to compare and analyse different analysis tools. REFERENCES [1] McAfee Labs. Mcafee threats report: Third quarter 2012, Online Available at: Last Accessed On: 10 th July 2014 [2] NQ Mobile. Nq mobiles 2012 security report. Online Available at Last Accessed On: 10 th July 2014 [3] A. Moser, C. Kruegel, and E. Kirda. Exploring multiple execution paths for malware analysis. In Security and Privacy, SP 07. IEEE Symposium on, pages , [4] Jianwei Zhuge, Thorsten Holz, Chengyu Song, Jinpeng Guo, Xinhui Han, and Wei Zou. Studying malicious websites and the underground economy on the chinese web. In Managing Information Risk and the Economics of Security, pages Springer US, [5] David Kushner. The real story of stuxnet, Feb Last Accessed On: 10 th July [6] Hassen Saidi Phillip Porras and Vinod Yegneswaran. An analysis of conficker s logic and rendezvous points. Technical report, SRI International, [7] Hao Chen, Drew Dean, and David Wagner. Model checking one million lines of c code. In In Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS, pages ,
11 [8] Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, and Barton P. Miller. Formalizing sensitivity in static analysis for intrusion detection. In In IEEE Symposium on Security and Privacy, [9] Mihai Christodorescu and Somesh Jha. Static analysis of executables to detect malicious patterns. In In Proceedings of the 12th USENIX Security Symposium, pages , [10] Andreas Moser, Christopher Kruegel, and Engin Kirda. Limits of static analysis for malware detection, [11] Blake Hartstein Matthew Richard Michael Ligh, Steven Adair. Malware Analyst s Cookbook: Tools and Techniques for Fighting Malicious Code. John Wiley & Sons, [12] William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. Taintdroid: an informationflow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI 10, pages 1 6, Berkeley, CA, USA, USENIX Association. [13] Feng Qin, Cheng Wang, Zhenmin Li, Ho-seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 39, pages , Washington, DC, USA, IEEE Computer Society. [14] Asia Slowinska and Herbert Bos. Pointless tainting? Evaluating the practicality of pointer tainting, [15] Edward J. Schwartz, Thanassis Avgerinos, and David Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In In Proceedings of the IEEE Symposium on Security and Privacy, [16] Cryptography reference: Microsoft Corporation, Last Accessed On 10 th July, [17] User mode and kernel mode: Microsoft developer center-hardaware, Last Accessed On 10 th July, [18] Christopher Kruegel, William Robertson, and Giovanni Vigna. Detecting kernel-level rootkits through binary analysis. In In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Tuscon, AZ, [19] G Nebbett. Windows NT/2000 Native API Reference. New Riders Publishing, Thousand Oaks, CA, SA, [20] GCC options of code generation conventions. Gen-Options.html. Last Accessed On 10 th July, [21] Galen Hunt and Doug Brubacher. Detours: binary interception of win32 functions. In Proceedings of the 3rd conference on USENIX Windows NT Symposium - Volume 3, WINSYM 99, pages 14 14, Berkeley, CA, USA, USENIX Association. [22] Microsoft corporation: Debug hook function writing. Last Accessed On 10 th July, [23] Mihai Christodorescu, Somesh Jha, and Christopher Kruegel. Mining specifications of malicious behavior. In In Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 5 14, [24] Fabrice Bellard. Qemu, a fast and portable dynamic translator. In Proceedings of the annual conference on USENIX Annual Technical Conference, ATEC 05, pages 41 41, Berkeley, CA, USA, USENIX Association. 73
12 [25] Min Gyung Kang, Pongsin Poosankam, and Heng Yin. Renovo: a hidden code extractor for packed executables. In Proceedings of the 2007 ACM workshop on Recurring malcode, WORM 07, pages 46 53, New York, NY, USA, ACM. [26] L. Martignoni, M. Christodorescu, and S. Jha. Omniunpack: Fast, generic, and safe unpacking of malware. In Computer Security Applications Conference, ACSAC Twenty-Third Annual, pages , [27] Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In In Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS07. DRAFT, [28] C. Willems, T. Holz, and F. Freiling. Toward automated dynamic malware analysis using cwsandbox. Security Privacy, IEEE, 5(2):32 39, [29] Artem Dinaburg, Paul Royal, Monirul Sharif, and Wenke Lee. Ether: malware analysis via hardware virtualization extensions. In Proceedings of the 15th ACM conference on Computer and communications security, CCS 08, pages 51 62, New York, NY, USA, ACM. [30] Manuel Egele, Christopher Kruegel, Engin Kirda, and Heng Yin. Dynamic spyware analysis. In Proceedings of the 2007 Usenix Annual Conference, [31] Heng Yin, Zhenkai Liang, and Dawn Song. Hookfinder: Identifying and understanding malware hooking behaviors [32] Norman Solutions. Norman Sandbox Whitepaper, [33] Fanglu Guo, Peter Ferrie, and Tzi-Cker Chiueh. A study of the packer problem and its solutions. In Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, RAID 08, pages , Berlin, Heidelberg, Springer-Verlag. [34] P. Royal, M. Halpin, D. Dagon, R. Edmonds, and Wenke Lee. Polyunpack: Automating the hidden-code extraction of unpack-executing malware. In Computer Security Applications Conference, 2006, pages , Waqas Aman received his bachelor s degree in Computer Sciences from University of Peshawar in 2008 and earned his MS-InfoSec degree from National University of Sciences & Technology Pakistan in He is currently pursuing his Ph.D. in Information Security at Gjøvik University College Norway, working as a Research Fellow in the Adaptive Security for Smart Internet of Things in ehealth (ASSET) Project financed by the Research Council of Norway. He also have industrial expertise in technical information security as well as in product management and has earned various international certifications including CEH, CEI, ECSA, ENSA, EDRP and ITIL and remained Certified Instructor for EC-Council Technical Certifications in South Asia. 74
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Full System Emulation:
Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware Christopher Kruegel Lastline, Inc. [email protected] 1 Introduction Automated malware analysis systems (or sandboxes)
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes
Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes Ahmed F.Shosha, Joshua I. James, Alan Hannaway, Chen-Ching Liu and Pavel Gladyshev UCD School of
LASTLINE WHITEPAPER. Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade
LASTLINE WHITEPAPER Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade Abstract Malicious code is an increasingly important problem that threatens the security of computer systems. The
Dynamic Spyware Analysis
Dynamic Spyware Analysis Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, and Dawn Song Secure Systems Lab Technical University Vienna {pizzaman,chris,ek}@seclab.tuwien.ac.at Carnegie Mellon University
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING MONISHA.T #1 and Mrs.UMA.S *2 # ME,PG Scholar,Department of CSE, SKR Engineering College,Poonamallee,Chennai,TamilNadu * ME,Assist.professor,
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY ABHILASH SREERAMANENI DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SEOUL NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY
Denial-of-Service Attacks on Host-Based Generic Unpackers
Denial-of-Service Attacks on Host-Based Generic Unpackers Limin Liu 1, Jiang Ming 2, Zhi Wang 2,3, Debin Gao 2, and Chunfu Jia 3 1 State Key Lab of Information Security, Graduate University of CAS, China
Detection and Identification of Android Malware Based on Information Flow Monitoring
Detection and Identification of Android Malware Based on Information Flow Monitoring Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong To cite this version: Radoniaina Andriatsimandefitra, Valérie
Dynamic Spyware Analysis
Dynamic Spyware Analysis Manuel Egele, Christopher Kruegel, Engin Kirda Secure Systems Lab Technical University Vienna {pizzaman,chris,ek}@seclab.tuwien.ac.at Heng Yin Carnegie Mellon University and College
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
A Survey on Automated Dynamic Malware Analysis Techniques and Tools
A Survey on Automated Dynamic Malware Analysis Techniques and Tools MANUEL EGELE Vienna University of Technology THEODOOR SCHOLTE SAP Research, Sophia Antipolis ENGIN KIRDA Institute Eurecom, Sophia Antipolis
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Host-based Intrusion Prevention System (HIPS)
Host-based Intrusion Prevention System (HIPS) White Paper Document Version ( esnhips 14.0.0.1) Creation Date: 6 th Feb, 2013 Host-based Intrusion Prevention System (HIPS) Few years back, it was relatively
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
File Disinfection Framework (FDF) Striking back at polymorphic viruses
File Disinfection Framework (FDF) Striking back at polymorphic viruses 1 CONTENTS Introduction 3 File Disinfection Framework (FDF) 4 Disinfection solution development today 5 Goals 6 Target audience 6
The Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Detecting the One Percent: Advanced Targeted Malware Detection
Detecting the One Percent: Advanced Targeted Malware Detection Tomer Teller Check Point Software Technologies Session ID: SP02-T19 Session Classification: Intermediate Antivirus 20 th+ Anniversary The
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Dynamic analysis of malicious code
J Comput Virol (2006) 2:67 77 DOI 10.1007/s11416-006-0012-2 ORIGINAL PAPER Dynamic analysis of malicious code Ulrich Bayer Andreas Moser Christopher Kruegel Engin Kirda Received: 13 January 2006 / Accepted:
Visual Analysis of Malware Behavior Using Treemaps and Thread Graphs
Visual Analysis of Malware Behavior Using Treemaps and Thread Graphs Philipp Trinius Thorsten Holz Jan Göbel Felix C. Freiling Laboratory for Dependable Distributed Systems, University of Mannheim, Germany
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
PE Explorer. Heaventools. Malware Code Analysis Made Easy
Heaventools PE Explorer Data Sheet Malware Code Analysis Made Easy Reverse engineers within the anti-virus, vulnerability research and forensics companies face the challenge of analysing a large number
Privacy Scrubber: Means to Obfuscate Personal Data from Benign Application Leakage
Privacy Scrubber: Means to Obfuscate Personal Data from Benign Application Leakage Michael Walker Youngstown State University One University Plaza Youngstown, Oh 44555 USA 1.877.468.6978 [email protected]
Spyware Doctor Enterprise Technical Data Sheet
Spyware Doctor Enterprise Technical Data Sheet The Best of Breed Anti-Spyware Solution for Businesses Spyware Doctor Enterprise builds on the strength of the industry-leading and multi award-winning Spyware
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing
Journal of Computational Information Systems 11: 11 (2015) 3875 3881 Available at http://www.jofcis.com QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing Jingzheng
CERIAS Tech Report 2015-9 Basic Dynamic Processes Analysis of Malware in Hypervisors Type I & II by Ibrahim Waziri Jr, Sam Liles Center for Education
CERIAS Tech Report 2015-9 Basic Dynamic Processes Analysis of Malware in Hypervisors Type I & II by Ibrahim Waziri Jr, Sam Liles Center for Education and Research Information Assurance and Security Purdue
One Minute in Cyber Security
Next Presentation begins at 15:30 One Minute in Cyber Security Simon Bryden Overview Overview of threat landscape Current trends Challenges facing security vendors Focus on malware analysis The year? The
Reverse Engineering by Crayon: Game Changing Hypervisor and Visualization Analysis
Reverse Engineering by Crayon: Game Changing Hypervisor and Visualization Analysis Game Changing Hypervisor Based Malware Analysis and Visualization Danny Quist Lorie Liebrock New Mexico Tech Computer
Behavioral analysis of malicious code through network traffic and system call monitoring
Behavioral analysis of malicious code through network traffic and system call monitoring André R. A. Grégio a,b, Dario S. Fernandes Filho a,b, Vitor M. Afonso a,b, Rafael D. C. Santos c, Mario Jino b,
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director [email protected]
The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director [email protected] Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation
VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Cisco Advanced Malware Protection Sandboxing Capabilities
White Paper Cisco Advanced Malware Protection Sandboxing Capabilities What You Will Learn How sandboxing is a key part of network security when it operates as an integrated component of a complete solution.
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Behavior-based Spyware Detection
Behavior-based Spyware Detection Engin Kirda and Christopher Kruegel Secure Systems Lab Technical University Vienna {ek,chris}@seclab.tuwien.ac.at Greg Banks, Giovanni Vigna, and Richard A. Kemmerer Department
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues.
FAKE ANTIVIRUS MALWARE This information has come from http://www.bleepingcomputer.com/ - a very useful resource if you are having computer issues. The latest tactic currently being used by malware creators
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Fine-grained covert debugging using hypervisors and analysis via visualization
Reverse Engineering by Crayon: Game Changing Hypervisor and Visualization Analysis Fine-grained covert debugging using hypervisors and analysis via visualization Daniel A. Quist Lorie M. Liebrock Offensive
ESET NOD32 ANTIVIRUS 9
ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
Real World and Vulnerability Protection, Performance and Remediation Report
Real World and Vulnerability Protection, Performance and Remediation Report A test commissioned by Symantec Corporation and performed by AV-Test GmbH Date of the report: September 17 th, 2014, last update:
White Paper. Advantage FireEye. Debunking the Myth of Sandbox Security
White Paper Advantage FireEye Debunking the Myth of Sandbox Security White Paper Contents The Myth of Sandbox Security 3 Commercial sandbox evasion 3 Lack of multi-flow analysis and exploit detection 3
for Malware Analysis Daniel Quist Lorie Liebrock New Mexico Tech Los Alamos National Laboratory
Visualizing Compiled Executables for Malware Analysis Daniel Quist Lorie Liebrock New Mexico Tech Los Alamos National Laboratory Overview Explanation of Problem Overview of Reverse Engineering Process
ESET NOD32 ANTIVIRUS 8
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
Advanced Endpoint Protection Overview
Advanced Endpoint Protection Overview Advanced Endpoint Protection is a solution that prevents Advanced Persistent Threats (APTs) and Zero-Day attacks and enables protection of your endpoints by blocking
Nessus and Antivirus. January 31, 2014 (Revision 4)
Nessus and Antivirus January 31, 2014 (Revision 4) Table of Contents Introduction... 3 Standards and Conventions... 3 Overview... 3 A Note on SCAP Audits... 4 Microsoft Windows Defender... 4 Kaspersky
Spyware Analysis. [email protected]. Security Event - April 28, 2004 Page 1
Spyware Analysis [email protected] Security Event - April 28, 2004 Page 1 Content Definition & types of spyware Statistics Hooks Static vs. dynamic software analysis Test environment for spyware Analysis
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
Virus Bulletin 2013 The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications Next Generation Intelligent Networks Research Center (nexgin RC) http://wwwnexginrcorg/
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
FOR MAC. Quick Start Guide. Click here to download the most recent version of this document
FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
Honeypot as the Intruder Detection System
Honeypot as the Intruder Detection System DAVID MALANIK, LUKAS KOURIL Department of Informatics and Artificial Intelligence Faculty of Applied Informatics, Tomas Bata University in Zlin nam. T. G. Masaryka
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Self Protection Techniques in Malware
DSIE 10 5 th Doctoral lsymposium on Informatics Engineering i January 28 29, 2010 Porto, Portugal Self Protection Techniques in Malware Tiago Santos Overview Introduction Malware Types Why Self Protection?
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
CIT 480: Securing Computer Systems. Malware
CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
Hi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
White Paper. No Signature Required: The Power of Emulation in Preventing Malware
No Signature Required: The Power of Emulation in Preventing Malware Table of Contents Emerging Threats Require a New Approach to Protection....3 Real-Time Behavior Emulation of Web Content...3 Use Case
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware
What do a banking Trojan, Chrome and a government mail server have in common? Analysis of a piece of Brazilian malware Contents Introduction.................................2 Installation: Social engineering
Trend Micro OfficeScan 11.0 SP1. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 SP1 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications
Reverse Engineering ios Applications Drew Branch, Independent Security Evaluators, Associate Security Analyst ABSTRACT' Mobile applications are a part of nearly everyone s life, and most use multiple mobile
