A Survey on Automated Dynamic Malware-Analysis Techniques and Tools
xiaohu 摸鱼家

Summary

This paper is a survey on automated dynamic malware analysis, written by Manuel Egele et al. in 2012. The paper first introduces the types of malware and then discusses the analysis techniques and tools. The types of malware are classified into:

  • Worm.
  • Virus.
  • Trojan horse.
  • Spyware.
  • Bot.
  • Rootkit.

Specific malware instances may exhibit the characteristics of multiple types. The analysis techniques for these malwares are classified into function call monitoring, function parameter analysis, information flow tracking, instruction trace, and autostart extensibility points. However, the sophisticated authors of malware also strived to evade investigation. For example, malwares may exhibit nonmalicious behavior when they detect analysis tools, and they are packed and obfuscated to encumber analysis conducted on them. Implementing a malware analysis system requires different design decisions that have far-reaching consequences. An analysis component that executes at a higher privilege level than the program under analysis cannot be accessed by this program. Implementing the analysis functionality on an emulator or virtual machine allows the analysis to conceal itself even from malware that executes in kernel space. The implementation strategies involve:

  • Analysis in user/kernel space.
  • Analysis in an emulator.
  • Analysis in a virtual machine.

The technique for resetting the analysis environment is also essential because results are only comparable if each sample is executed in an identical environment. Moreover, the network simulation method simulates the network so that the malware’s behavior requiring the network can be observed. Generic detection and reconstruction of packed code are devised to deobfuscate binaries that are obfuscated with unknown packers. There are many tools using the different techniques mentioned above. The paper gives a summary describing which strategies are implemented for each tool. A discussion on the approaches, possible evasion techniques, and advantages over other approaches is given as well.

English Learning

  1. words:
    vendor
    discriminate, differentiate, distinguish, discrepency
    malicious, malware, malvolent
    legitimate
    spam (spam email)
    surreptitiously
    credential (banking credential)
    sophisticated (knowledgeable)
    mitigation (the detection and mitigation of malicious sorftware)
    tedious (a tedious and error-prone task)
    inherently (naturally)
    tailored (specifically tailored malware, tailored suit)
    coordinated (in a coordinated manner)
    tamper (interfere, tamper with operating system)
    commodity (commodity off-the-shelf operating system)
    nefarious
    lure
    evasion, circumvent (evade), disguise, conceal
    flaw (demerit)
    ambiguous (uncertain)
    exacerbate (make worse)
    thwart, intercept, encumber (burden), preclude, cease (stop)
    resilient (flexible)
    intricate, curbersome, elaborate, opaque (complex)
    applicability, feasibility
    viable (workable)
    leak
    cloak

  2. phrases:
    pose a threat to
    employ techniques
    strive to do (make every effort)
    time-consuming (tedious)
    error-prone
    at the expense of
    in combat against
    familiarize … with … (familiarize the reader with the technology that we will be using in the remainder of this work)
    point of view
    shed light on
    tamper-proof
    handle over
    cloak the slowdown
    steer number of (a large number of)
    exhibit the characteristics of

  3. technical words:
    orthogonal
    obfuscate (encrypt), deobfuscate (decrypt)
    taxonomy
    emulator
    overlay

  4. technical phrases:
    intended function
    reconvergence point
    analysis component, analysis functionality

 评论