The Software Similarity Problem in Malware Analysis
|
|
|
- Miles Snow
- 10 years ago
- Views:
Transcription
1 The Software Similarity Problem in Malware Analysis Andrew Walenstein and Arun Lakhotia 1 University of Louisiana at Lafayette, Center for Advanced Computer Studies, P.O. Box 44330, Lafayette, LA , U.S.A. [email protected],[email protected] Abstract. In software engineering contexts software may be compared for similarity in order to detect duplicate code that indicates poor design, and to reconstruct evolution history. Malicious software, being nothing other than a particular type of software, can also be compared for similarity in order to detect commonalities and evolution history. This paper provides a brief introduction to the issue of measuring similarity between malicious programs, and how evolution is known to occur in the area. It then uses this review to try to draw lines that connect research in software engineering (e.g., on clone detection ) to problems in antimalware research. Keywords. software, software evolution, commonality, program similarity, code clones, code smells, malicious software, malware, worms, Trojans, viruses, spyware, botnets, software visualization 1 Introduction The problem of comparing software in order to determine how similar it is crops up in many contexts. Sometimes a software system is compared against itself to search for redundancies that might exist. For example, the problem of finding scavenged pieces of code code that has been copied and then perhaps modified is called clone detection [1]. At a more fine-grained level, programs may be compared against themselves to reduce the size of a program by squeezing out some of its redundancies at the machine-code level [2,3]. One piece of software may also be compared against another to look for evidence of copyright infringement or plagiarism (e.g., Lancaster et. al [4]). A software system may also be compared to previous versions of itself in an effort to reconstruct its evolution history (e.g., Zhou et. al [5]). The problem of finding similarities in software systems, therefore, is a meeting point that relates several research and practice areas, among them: software engineering, education, and law. The aim of this paper is to show that another area deserves to be added to that list: the area of malware analysis. The term malware is used to refer to software that is malicious: worms, viruses, Trojans, and so on. Malware analysis therefore refers to the problems of understanding Dagstuhl Seminar Proceedings Duplication, Redundancy, and Similarity in Software
2 2 A. Walenstein, A. Lakhotia and managing malicious software, a task that is ordinarily performed in the context of computer security and defense. But how is malware analysis related to these other areas? First, a brief introduction of certain problems in malware analysis is provided in Section 2. The overview makes the case that like is the case for clone detection, compression, and plagiarism program similarity is a key sub-problem in malware analysis. Section 3, establishes relationships to problems and research between malware analysis and other related problems such as plagiarism and evolution analysis. The paper concludes by arguing new research in the area is required. 2 The Reuse / Recognition War in Malware Analysis The problem of finding similarities in programs is a central problem in malware analysis. A key battle between malware producer and defender is reviewed below, which is then used to explain why program similarity comparison is an important part of the defense in this battle. 2.1 WMDs in the Signature Variation Battle Malware writing is now a professional occupation [6]. There are many illegal money-making schemes that have been brought into the 21 st century with the aid of malware. These include identity theft (enabling fraud), theft of valuables (such as passwords, program keys), extortion, and leasing of botnets (legions of remotely-controlled zombie computers). Malware also is a great enabler of espionage, both corporate and military. Its development has proceeded to the point where malware construction appears now like a prodigious industry. How prodigious? According to Symantec, 21,858 unique samples of malicious programs were discovered by it in 2005 [6]. That works out to 60 per day on average. More recently, Microsoft reported that they found 97,924 distinct variants of malware within the first half of 2006 [7]. That is over 22 per hour. If each of these malicious programs is considered to be a delivered computer product, then certainly the malware area can be considered to be quite the productive software construction industry. How can malware authors be so productive? There are, most assuredly, not 100,000 malware authors, each one producing a single new program once every 6 months or so. Neither are there a smaller number of authors who produce completely new programs every few hours. Rather, most of the different malicious programs seen are modifications of some previous one. Many of these differences are minor: new data in an unused part of the executable headers, a change to a string, bug fixes, and so on. Other variations signal a relatively important change, such as the insertion of a new feature, like a new method for propagating. These more comprehensive changes are relatively rarer; a large enough change can trigger a change in the names given to the malware family: from Bagle.AG to Bagle.AH, for example.
3 Similarity in Malware 3 Why are there so many variations? One of the key reasons is that malware authors are engaged with an ongoing war against malware detector producers. The authors do not wish to write new code from scratch, but anti-malware companies create signatures to match their programs, reducing the number of hosts that are vulnerable to its attack. In order to defeat the signatures the malware authors can modify their programs until the most recent signatures no longer correctly match, and the malware is not detected. Over the years, the antimalware companies have reduced the time needed to produce new signatures. But, as the time needed for new signatures decreases, one might reasonably expect the rate of variation production to increase proportionately [8]. In the war between malware author and malware detectors, one of the major battles is between signature and variation construction. In this ongoing battle, malware authors need to make changes that work to undermine recognition and hence detection. Malware authors are known to vet their code against malware detectors. They keep versions of many malware detectors and check to see whether (and which) signatures catch their newest versions. If their new versions are being caught, they can attempt to make changes until they find that the signatures no longer match. That is, their battle position is to try to make changes that destroy the ability of detectors to match them to knowledge about previously released versions. These program modifications, therefore, may be termed Weapons of Match Destruction (WMDs). A few of these are reviewed below. WMD: Encryption and Packing Many malware executables are either encrypted or packed. In this context, it means that the programs are no longer in a format that is directly executable by the machine. 1 Rather, what happens when a packed or encrypted program is run is that a small decompression or decryption procedure is executed which reconstructs the full version of the original program from the packed or encrypted data. In either the packing or encryption case, if it is done well the result will be indistinguishable from random data. If so, then there is effectively no possibility of finding matches to previous versions without first unpacking or decrypting. WMD: Byte- or Container-Level Changes All machine-executable programs are packaged into some type of executable container format. This container typically contains a variety of information in the header, including the program s identity, dynamic linking information, and a list of program parts or segments, such as the segments holding the data and code. By treating a program at the level of a package or string of bytes, multiple variations can be forced on the program executables without making changes to the actual code. These changes include: modifications of strings or values in the data segment and change in headers. 1 The term packed in malware is generally distinct from the notion of program compression in the sense frequently implied in the program compression literature [3].
4 4 A. Walenstein, A. Lakhotia WMD: Ordinary Evolution Like any other used software product, malware evolves. Malware evolves for the same reasons that ordinary software evolves. A given malware family can change over time simply because bugs are fixed. It can also evolve in response to changing requirements. For example, changes to system defenses may require a worm be changed to use a different exploit during propagation. Malware also evolves by borrowing or copying code between families. In part this is due to the voluntary sharing of ideas and code within the malware production community. In the past, this was done using a variety of means, including bulletin boards, magazines, and Internet-relay chat. Recently, the code to even professional malware has become widely circulated; some is even published as open source. [9] For example, one Bagle variant included its own source code. Because of this practice, it is common for one malware family to be related to another family via the sharing of some code. WMD: Obfuscation The goal of program obfuscation is to make a program more difficult to understand or analyze. In the context of malware, obfuscations can be separated into two categories: extraction hindrance and provenance hiding. Extraction hindrance seeks to defeat the ability to extract accurate information about the program. For example, it is possible to insert junk bytes into a program in such a way that certain types of program disassembly produce incorrect disassembly. Once the disassembly is rendered incorrect, follow-on detection methods may be defeated. Provenance hiding seeks to obscure the fact that the program is derived from a previous one. So even if program information can be extracted correctly, the relationship to previous programs can still be obscured. For example, if code blocks are permuted there is no effective change to the program, yet any detection method that depends on the sequencing of blocks may be defeated. WMD: Metamorphism A program is called metamorphic if it is able to generate offspring that are different from it due to the fact that it transforms its own code [10]. Using metamorphism it is theoretically possible to ensure the program for each variant is somehow different. For example, it has been conservatively estimated that the Win32.Evol virus could conceivably create 10 1,339 variations in just two generations [11]. 2.2 Countering the WMDs The fact is that most malicious programs found in the wild are variants of some previous one [8]. Because of this, the problem of comparing unknown files to previously-known malicious samples becomes important. In particular, from the viewpoint of the battle analogy, for every WMD, some defensive measure must
5 Similarity in Malware 5 be constructed so that the potency of the weapons are reduced. In the ideal case, the defense would be able to see past any WMD in order to establish the similarity of an unknown program to known malicious programs. If such a powerful similarity mechanism was available then a new variant with only minor changes would not easily slip past the defenses. This capability could turn reuse from an advantage for the malware author into a disadvantage. 3 Malware Similarity The defense side in the signature variation battle needs to have methods for countering the WMDs. This means, that some way must be found for seeing through the variations introduced by the WMDs. Once variations are accounted for the new version may be matched against old ones. In this light, the problem is one of matching a recurring pattern with variations. This can be turned into a problem of program matching and similarity comparison. Similarity comparisons between programs can be useful for: 1. Detecting new variants as they are released by comparing them to known related variants. 2. Constructing new signatures to match the variant based on a similarity analysis between it and known previous variations. 3. Determining commonalities and relationships between different malware strains. This is important for leveraging past knowledge about threats. For example, if one knows that a new program is related to the well-known Win32.Abogot family, then one may have a good initial idea at the sorts of malice and problems it creates. Thus program similarity evaluations can and do play a key role in malware analysis. The purpose of this section is to draw out some of the relations between malware analysis and other related works in code similarity comparison. These relations are, naturally, drawn out by noting similarities between malware analysis and these other fields. The review seeks to highlight similarities in: problems that need solving, method used, and commonalities in research or research direction. 3.1 Similarity of Problems The WMDs generate the key problems for comparing programs in malware analysis. The problems they generate have some clear similarities with the essential problems in other areas. These include: Plagiarism and Copyright Infringement Detection. Relating one malicious software family to another involves, in part, comparing two or more software systems to find evidence where parts of one
6 6 A. Walenstein, A. Lakhotia software system match parts of another. The same problem is shared in detecting plagiarism and copyright infringement. Any of the WMDs may be used to help hide provenance. The WMD of obfuscation provides an example of how the problems are similar. For instance a new variant might differ only in the fact that the registers have been consistently renamed (e.g. swapping eax and ebx), and the order of basic blocks in the program has been permuted. These sorts of provenance obfuscations are, of course, common in plagiarism and copyright infringement when the perpetrator wishes to cover their tracks and hide the derivation relationship. Software Evolution and Refactoring. Malware evolves because the authors make fixes and improvements; they also refactor their code and insert foreign from other malware. These evolutionary changes present challenges to knowing how the members of a malware family relate to one another, and how different families are related via sharing of code. A similar problem is found in ordinary software evolution wherein changes make it difficult to track evolution, compare versions, and relate multiple programs. To illustrate the similarities, consider the dendogram shown in Figure 1. It shows a tree of proposed relationships between malware programs as generated by a clustering operation. Similar trees are found in phylogeny work for malware [12] as well as for ordinary software projects [13]. Fig. 1. Reconstructed evolution history for malware Compression. At the machine code level a program can exhibit similarities that are not present at the source code level and, conversely, similarities present at the source code level may not be clearly expressed at the machine code level.
7 Similarity in Malware 7 Since malware is normally encountered in machine code format, malware similarity analysis must account for the irrelevant similarities expressed at the machine code level as well as the relevant similarities that are hidden at the machine code level. Machine code-level program compression research has to contend with similar problems. Using the above analysis, a rough map of problem commonalities is produced in Table 1. Each row indicates the WMD that causes a particular research Issues evolution obfuscation machine code redundancy metamorphism Plagiarism Copyright Refactoring Evolution Compression Malware Table 1. Skeletal map of relations between areas problem or issue; each column indicates the other area that is related by problem type. 3.2 Similarity in Methods & Research In related problem areas, methods for clone detection, copyright infringement detection, and plagiarism detection share some common features. The overall methods can be modeled at a very high level as consisting of a pipeline of processing as illustrated in Figure 2. While we model this as a simple pipeline, Fig. 2. Abstract program comparison pipeline in reality the steps may be interleaved and sometimes certain steps are omitted. This structure provides a way of organizing a comparison of methods and research from malware analysis and other related fields.
8 8 A. Walenstein, A. Lakhotia Normalize Input programs frequently contain text or features that are considered irrelevant for the purposes of the comparisons being made. Normalization is the process of mapping the input programs into a form in such a way that irrelevant variation is removed and the input becomes more normal. A classic example is to remove whitespace from program texts before searching for evidence of plagiarism. Other more extensive normalizations have been proposed, including consistent replacement of identifiers with tokens [14], tokenizing various punctuation [15], and normalizing the form of syntax trees [16]. Normalization can also be an important step in malware analysis. In many respects the problem of normalization is similar for malware analysis, although in many cases the methods from benign code comparison have not carried over. For instance, the idea of consistent tokenization of identifiers may be useful in matching malware since instead of identifiers one can talk about registers at the machine code, as Baker et. al [17] for virtual machine code. Nonetheless, we do not know of any results in malware analysis using such techniques. Instead, the main research on normalization of malware has tended to employ relatively heavyweight semantics-preserving program transformations. For example, Kruegel et. al [18] investigated the use of transformations typically found in optimizing compilers constant propagation, simplification, and so on for normalizing malware as an aid to scanners; Walenstein et. al [11] used a term rewriting system to undo the transformations automatically performed by a self-rewriting virus. The more frequent use of more heavyweight semantics-based transformations in malware normalization may be due, perhaps, to the fact that the changes that are used to hide similarity in malware have been more complicated than those typically found in, say, student plagiarism. Alternatively, there may be fewer simple normalizations available in machine code as compared to source code. Whatever the reasons, one can expect that similar types of normalizing transformations might be used for plagiarism or clone detection. Comparison Once relevant items have been normalized and extract, some type of comparison framework must be employed to perform the comparisons. Several of such comparison frameworks are listed by Anderson et. al [19]. These are organized, in part, according to the implementation techniques used to detect clones, which may be interpreted as indicating also the models of comparison being used. From this list, one can see that many of these techniques are also used in malware analysis, including: graph matching [18] and distance metrics [20]. 3.3 Similarities in Research or Research Direction In malware analysis there are many important research problems which these align with problems found in our target related areas of clone detection, refactoring, plagiarism detection, and code compression. These include the following (related important problems are placed in parentheses):
9 Similarity in Malware 9 How to deal with variations created by compiler or compiler option differences (compression) Removing the influence of library code linked into the program (compression) Tracing evolution lines (clone detection/refactoring) Matching against large corpora (clone detection/refactoring, plagiarism) Removing obfuscations in programs (plagiarism) This list is certainly not complete; rather, it can be used as a starting point for researchers from different problem worlds in their discussion of how to collaborate or use results from one area in a new one. 4 Conclusions Malicious programs evolve, and there is much borrowing of code between different families of malware. Recognizing and modeling how these programs evolve and are related is an important problem in the area of malware analysis. For this reason the problem of matching and relating programs by their common parts is a key problem within malware analysis. Since this problem shares many parallels in other fields, many useful links to other research areas can be made. In drawing out some of these linkages, this paper seeks to improve the amount of cross-fertilization between research areas. In particular, we note that there are several techniques or approaches that appear to be primarily explored in one area or another. For example, relatively few techniques from clone detection and plagiarism have their parallels in malware analysis (however it should be noted that this problem in malware analysis is just now starting to get any significant attention). Conversely, the normalization approach using semanticsbased transformations have rarely been seen in other areas such as plagiarism and clone detection. In the future we hope that finding a common set of core problems and approaches will serve to pool research together and result in advances in all of the related fields. References 1. Koschke, R.: Survey of research on software clones. [21] ISSN Evans, W.: Program compression. [21] ISSN Beszédes, Á., Ferenc, R., Gyimóthy, T., Dolenc, A., Karsisto, K.: Survey of codesize reduction methods. ACM Computing Surveys 35 (2003) Lancaster, T., Culwin, F.: A comparison of source code plagiarism detection engines. Computer Science Education 14 (2004) Zou, L., Godfrey, M.W.: Using origin analysis to detect merging and splitting of source code entities. IEEE Transactions on Software Engineering 31 (2005) Ször, P.: The Art of Computer Virus Research and Defense. Symantec Press (2005) 7. Braverman, M., Williams, J., Mador, Z.: Microsoft security intelligence report: January June 2006 (2006) 1C B3F-4C3A-868E-36A553FE2A02.
10 10 A. Walenstein, A. Lakhotia 8. Walenstein, A., Venable, M., Hayes, M., Thompson, C., Lakhotia, A.: Exploiting similarity between variants to defeat malware: Vilo method for comparing and searching binary programs. In: Proceedings of BlackHat DC (2007) https: //blackhat.com/presentations/bh-dc-07/walenstein/paper/bh-dc-07-walenstein-wp.pdf. 9. Lyda, R., Hamrock, J.: Exploring investigative methods for identifying and profiling serial bots. Journal of Digital Forensic Practice 1 (2006) Ször, P., Ferrie, P.: Hunting for metamorphic. In: Proceedings of the 11th International Virus Bulletin Conference. (2001) 11. Walenstein, A., Mathur, R., Chouchane, M.R., Lakhotia, A.: Normalizing metamorphic malware using term-rewriting. In: Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2006), Philadelphia, PA (2006) Karim, M.E., Walenstein, A., Lakhotia, A., Parida, L.: Malware phylogeny generation using permutations of code. European Research Journal of Computer Virology 1 (2005) Yamamoto, T., Matsushita, M., Kamiya, T., Inoue, K.: Measuring similarity of large software systems based on source code correspondence. In: Product Focused Software Process Improvement. Volume 3547 of Lecture Notes in Computer Studies. Springer Berlin / Heidelberg (2005) h6m2vg5c3ejk38l Baker, B.S.: Parameterized duplication in strings: Algorithms and an application to software maintenance. SIAM Journal on Computing 26 (1997) http: //dx.doi.org/ /s Kamiya, T., Kusumoto, S., Inoue, K.: A multilinguistic token-based code clone detection system for large scale source code. IEEE Transactions on Software Engineering 8 (2002) clone-kamiya.pdf. 16. Baxter, I.D., Yahin, A., Moura, L.M.D., Sant Anna, M., Bier, L.: Clone detection using abstract syntax trees. In: 14th IEEE International Conference on Software Maintenance (ICSM 98), Washington, DC, USA, IEEE Computer Society (1998) Baker, B.S., Manber, U.: Deducing similarities in java sources from bytecodes. In: Proceedings of the USENIX Annual Technical Conference (NO 98), 2560 Ninth Street, Suite 215, Berkeley, CA, 94710, USENIX (1998) org/publications/library/proceedings/usenix98/baker.html. 18. Kruegel, C., Kirda, E., Mutz, D., Robertson, W., Vigna, G.: Polymorphic worm detection using structural information of executables. In: Proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005). Lecture Notes in Computer Science, Springer-Verlag (2005) ek/papers/raid05_polyworm.pdf. 19. Anderson, P., Frenzel, P., Koschke, R., Rieger, M.: Source code clone detectors: Overview and open problems. [21] ISSN Bruschi, D., Martignoni, L., Monga, M.: Using code normalization for fighting selfmutating malware. In: Proceedings of International Symposium on Secure Software Engineering, IEEE (March, 2006) Proceedings of Dagstuhl Seminar 06301: Duplication, Redundancy, and Similarity in Software, Dagstuhl, Germany, Dagstuhl (2006) ISSN
LASTLINE WHITEPAPER. Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade
LASTLINE WHITEPAPER Why Anti-Virus Solutions Based on Static Signatures Are Easy to Evade Abstract Malicious code is an increasingly important problem that threatens the security of computer systems. The
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
k-gram Based Software Birthmarks
k-gram Based Software Birthmarks 2005 ACM Symposium on Applied Computing Ginger Myles Christian Collberg Department of Computer Science University of Arizona Tucson, AZ 85721 {mylesg,collberg}@cs.arizona.edu
Computer Virus Strategies and Detection Methods
Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008 Computer Virus Strategies and Detection Methods Essam Al Daoud 1, Iqbal H. Jebril 2 and Belal Zaqaibeh 3 1 Department of Computer Science,
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis
Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software
Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:
Detecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
Hackers: Detection and Prevention
Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips
Parasitics: The Next Generation. Vitaly Zaytsev Abhishek Karnik Joshua Phillips Agenda Overview W32/Xpaj analysis Overview of a virtual machine Software protection trends W32/Winemmem analysis W32/Induc
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY ABHILASH SREERAMANENI DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SEOUL NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses
RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015 CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: 4,900 new Android malware samples every day 04-04 Half of Android malware is
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
CIT 480: Securing Computer Systems. Malware
CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Self Protection Techniques in Malware
DSIE 10 5 th Doctoral lsymposium on Informatics Engineering i January 28 29, 2010 Porto, Portugal Self Protection Techniques in Malware Tiago Santos Overview Introduction Malware Types Why Self Protection?
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Polymorphic Worm Detection Using Structural Information of Executables
Polymorphic Worm Detection Using Structural Information of Executables Christopher Kruegel 1,EnginKirda 1, Darren Mutz 2, William Robertson 2, and Giovanni Vigna 2 1 Technical University of Vienna [email protected]
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Malware: Malicious Software
Malware: Malicious Software 10/21/2010 Malware 1 Viruses, Worms, Trojans, Rootkits Malware can be classified into several categories, depending on propagation and concealment Propagation Virus: human-assisted
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
File Disinfection Framework (FDF) Striking back at polymorphic viruses
File Disinfection Framework (FDF) Striking back at polymorphic viruses 1 CONTENTS Introduction 3 File Disinfection Framework (FDF) 4 Disinfection solution development today 5 Goals 6 Target audience 6
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
The Advantages of a Firewall Over an Interafer
FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:[email protected] Outline of Information Security Introduction Impact of information Need
Harnessing Intelligence from Malware Repositories
Harnessing Intelligence from Malware Repositories Arun Lakhotia and Vivek Notani Software Research Lab University of Louisiana at Lafayette [email protected], [email protected] 7/22/2015 (C) 2015
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
Virus Bulletin 2013 The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications Next Generation Intelligent Networks Research Center (nexgin RC) http://wwwnexginrcorg/
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Detecting Computer Viruses
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Detecting Computer Viruses Manju Khari, Chetna Bajaj Abstract Virus (in biology) refers to microorganism, means
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks Priyank Singhal Student, Computer Engineering Sardar Patel Institute of Technology University
Code Obfuscation Literature Survey
Code Obfuscation Literature Survey Arini Balakrishnan, Chloe Schulze CS701 Construction of Compilers, Instructor: Charles Fischer Computer Sciences Department University of Wisconsin, Madison December
OutbreakShield Effective and Immediate Protection against Email Virus Outbreaks
OutbreakShield Effective and Immediate Protection against Email Virus Outbreaks Ralf Benzmüller G DATA Software AG Introduction The virus protection provided by all current antivirus software products
Detecting Computer Worms in the Cloud
Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Industrial Application of Clone Change Management System
Industrial Application of Clone Change Management System Yuki Yamanaka, Eunjong Choi, Norihiro Yoshida, Katsuro Inoue, Tateki Sano Graduate School of Information Science and Technology, Osaka University,
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
CS 356 Lecture 9 Malicious Code. Spring 2013
CS 356 Lecture 9 Malicious Code Spring 2013 Review Chapter 1: Basic Concepts and Terminology Integrity, Confidentiality, Availability, Authentication, and Accountability Types of threats: active vs. passive,
Overview. Introduction. Conclusions WINE TRIAGE. Zero day analysis. Symantec Research Labs (SRL)
1 Overview Introduction WINE TRIAGE Zero day analysis Conclusions 2 5 locations: USA: Mountain View (CA), Culver City (CA), Herndon (VA) Europe: Dublin (IE), Sophia Antipolis(FR).. 4 thematic domains:
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
Anti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and Countermeasures Author: Debasis Mohanty www.hackingspirits.com Email ID: [email protected] [email protected] Table of Contents 1. INTRODUCTION............3 2.
Detection and mitigation of Web Services Attacks using Markov Model
Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan [email protected] Bhushan Sonawane [email protected] Department of Computer Science and Engineering, University of Maryland,
Software Fingerprinting for Automated Malicious Code Analysis
Software Fingerprinting for Automated Malicious Code Analysis Philippe Charland Mission Critical Cyber Security Section October 25, 2012 Terms of Release: This document is approved for release to Defence
Understanding the Threat of Banking Malware. Najla Etaher and George R S Weir
Understanding the Threat of Banking Malware Najla Etaher and George R S Weir Department of Computer and Information Sciences University of Strathclyde Glasgow G1 1XH {najla.etaher, george.weir}@strath.ac.uk
PROACTIVE PROTECTION MADE EASY
PROACTIVE PROTECTION AUTHOR: ANDREW NIKISHIN KASPERSKY LAB Heuristic Analyzer Policy-Based Security Intrusion Prevention System (IPS) Protection against Buffer Overruns Behaviour Blockers Different Approaches
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING MONISHA.T #1 and Mrs.UMA.S *2 # ME,PG Scholar,Department of CSE, SKR Engineering College,Poonamallee,Chennai,TamilNadu * ME,Assist.professor,
Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
A New Approach to Assessing Advanced Threat Solutions
A New Approach to Assessing Advanced Threat Solutions December 4, 2014 A New Approach to Assessing Advanced Threat Solutions How Well Does Your Advanced Threat Solution Work? The cyber threats facing enterprises
Comparing Files Using Structural Entropy
Comparing Files Using Structural Entropy Ivan Sorokin Doctor Web s Virus Lab, Ltd., 2 Malaya Monetnaya st., 970 Saint-Petersburg, Russia e-mail: [email protected]; [email protected] Abstract. One of the
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
DESIGN OF GENERIC ANTIVIRUS SYSTEM
SENRA Academic Publishers, British Columbia Vol. 8, No. 1, pp. 2775-2782, February 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 DESIGN OF GENERIC ANTIVIRUS SYSTEM Osaghae OE, *Egbokhare, FA and Chiemeke
Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
Network Security Chapter 12 Learning Objectives After reading this chapter, you should be able to: Recognize the basic forms of system attacks Recognize the concepts underlying physical protection measures
Malware. CS 161: Computer Security Prof. Vern Paxson. TAs: Jethro Beekman, Mobin Javed, Antonio Lupher, Paul Pearce & Matthias Vallentin
Malware CS 161: Computer Security Prof. Vern Paxson TAs: Jethro Beekman, Mobin Javed, Antonio Lupher, Paul Pearce & Matthias Vallentin http://inst.eecs.berkeley.edu/~cs161/ April 16, 2013 Announcements
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
The Information Security Problem
Chapter 10 Objectives Describe the major concepts and terminology of EC security. Understand phishing and its relationship to financial crimes. Describe the information assurance security principles. Identify
Forensic Decryption of FAT BitLocker Volumes
Forensic Decryption of FAT BitLocker Volumes P. Shabana Subair, C. Balan (&), S. Dija, and K.L. Thomas Centre for Development of Advanced Computing, PO Box 6520, Vellayambalam, Thiruvananthapuram 695033,
Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats
Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats Cybersecurity Policy for Small Firms Why is malware now a
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Symantec Email Security.cloud - Skeptic Whitepaper
TECHNICAL BRIEF: SYMANTEC EMAIL SECURITY.CLOUD........................................ Symantec Email Security.cloud - Skeptic Whitepaper Who should read this paper This white paper outlines the technical
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
Chapter 8: On the Use of Hash Functions in. Computer Forensics
Harald Baier Hash Functions in Forensics / WS 2011/2012 2/41 Chapter 8: On the Use of Hash Functions in Computer Forensics Harald Baier Hochschule Darmstadt, CASED WS 2011/2012 Harald Baier Hash Functions
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Sandy. The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis. Garage4Hackers
Sandy The Malicious Exploit Analysis. http://exploit-analysis.com/ Static Analysis and Dynamic exploit analysis About Me! I work as a Researcher for a Global Threat Research firm.! Spoke at the few security
