Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers discover code guarded by triggers via multiple path exploration, symbolic execution, or forced conditional execution, all without knowing the trigger inputs. We present a malware obfuscation technique that automatically conceals specific trigger-based behavior from these malware analyzers. Our technique automatically transforms a program by encrypting code that is conditionally dependent on an input value with a key derived from the input and then removing the key from the program. We have implemented a compiler-level tool that takes a malware source program and automatically generates an obfuscated binary. Experiments on various existing malware samples show that our tool can hide a significant portion of trigger based code. We provide insight into the strengths, weaknesses, and possible ways to strengthen current analysis approaches in order to defeat this malware obfuscation technique.

Impeding Malware Analysis Using Conditional Code Obfuscation / S. Monirul, A. Lanzi, J. Giffin, W. Lee - In: Network and distributed system security[s.l] : The internet Society, 2008 Feb. - pp. 1-13 (( convegno Annual Network & Distributed System Security tenutosi a San Diego nel 2008.

Impeding Malware Analysis Using Conditional Code Obfuscation

A. Lanzi
Secondo
;
2008

Abstract

Malware programs that incorporate trigger-based behavior initiate malicious activities based on conditions satisfied only by specific inputs. State-of-the-art malware analyzers discover code guarded by triggers via multiple path exploration, symbolic execution, or forced conditional execution, all without knowing the trigger inputs. We present a malware obfuscation technique that automatically conceals specific trigger-based behavior from these malware analyzers. Our technique automatically transforms a program by encrypting code that is conditionally dependent on an input value with a key derived from the input and then removing the key from the program. We have implemented a compiler-level tool that takes a malware source program and automatically generates an obfuscated binary. Experiments on various existing malware samples show that our tool can hide a significant portion of trigger based code. We provide insight into the strengths, weaknesses, and possible ways to strengthen current analysis approaches in order to defeat this malware obfuscation technique.
Settore INF/01 - Informatica
feb-2008
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
19_impeding_malware_analysis.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 1.68 MB
Formato Adobe PDF
1.68 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/455576
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 191
  • ???jsp.display-item.citation.isi??? ND
  • OpenAlex ND
social impact