期刊文献+

基于环境敏感分析的恶意代码脱壳方法 被引量:12

Malicious Hidden-Code Extracting Based on Environment-Sensitive Analysis
下载PDF
导出
摘要 加壳技术是软件的常用保护手段,但也常被恶意代码用于躲避杀毒软件的检测.通用脱壳工具根据加壳恶意代码运行时的行为特征或统计特征进行脱壳,需要建立监控环境,因此易受环境敏感技术的干扰.文中提出了一种基于环境敏感分析的恶意代码脱壳方法,利用动静结合的分析技术检测并清除恶意代码的环境敏感性.首先,利用中间语言对恶意代码的执行轨迹进行形式化表示;然后,分析执行轨迹中环境敏感数据的来源和传播过程,提取脱壳行为的环境约束;最后,求解环境约束条件,根据求解结果对恶意代码进行二进制代码插装,清除其环境敏感性.基于此方法,作者实现了一个通用的恶意代码脱壳工具:MalUnpack,并对321个最新的恶意代码样本进行了对比实验.实验结果表明MalUnpack能有效对抗恶意代码的环境敏感技术,其脱壳率达到了89.1%,显著高于现有基于动态监控的通用脱壳工具的35.5%和基于特征的定向脱壳工具的28.0%. Code packing is an obfuscation technique to protect against reverse engineering,but it is commonly used to hide malicious code from virus detection as well.Environment-sensitive packing techniques are able to check whether the run-time environment is suspicious,then malware can dynamically change the unpacking behaviors according to the environment.While many unpacking tools were proposed,such as static unpackers and dynamic unpackers,the existing solutions are either unable to handle unknown packing techniques,or vulnerable to various environment-sensitive techniques.In this paper,we propose a new unpacking approach based on environment-sensitive analysis.Our approach precisely tracks the flow of environment-sensitive data,then symbolically evaluates the recorded trace and gathers path constraints on environment-sensitive data.Using the collected path constraints,we can deduce the dependence of the packed malware's control flow on run-time environment then remove the environmental sensitivity of the malware.To demonstrate its effectiveness,we present a prototype system,called MalUnpack,and apply it to 321 in the wild packed malware samples.The experimental results show that MalUnpack can effectively identify and unpack 89.1% of the malware samples,while the number of using dynamic unpackers without environment-sensitive analysis is 35.5%,and the number of using signature-based unpacker is only 28.0%.
出处 《计算机学报》 EI CSCD 北大核心 2012年第4期693-702,共10页 Chinese Journal of Computers
基金 国家自然科学基金(60973141) 天津市自然科学基金(09JCYBJ00300) 高等学校博士学科点专项科研基金(20100031110030)资助~~
关键词 恶意代码分析 脱壳技术 环境敏感分析 污点分析 符号执行 malware analysis unpacking environment-sensitive analysis taint analysis symbolic execution
  • 相关文献

同被引文献65

  • 1曾勇军,朱俊虎,奚琪.程序自动脱壳数据采集技术研究[J].计算机应用,2009,29(3):813-816. 被引量:3
  • 22012年度计算机病毒及钓鱼网站统计报告[EB/OL].http://roll.sohu.corn/201;30402/n371548462.shtsh,2015.
  • 3Symantae. 2015 Internet Security Threat Report [OL]. [2014-07-06]. https://know, elq. symantec, com/LP=1542.
  • 4Barak B, Goldreich O, Impagliazzo R, et al. On the (ira) possibility of obfuscating programs [C] //Proc of Int Cryptology Conf(CRYPTO 2001). Berlin: Springer, 2001 1-18.
  • 5Falcarin P, Carlo S D, Cabutto A, et al. Exploiting code mobility for dynamic binary obfuscation [C] HProc of Internet Security (WorldCIS). Piscataway, NJ: IEEE, 2011:114-120.
  • 6Godefroid P, Levin M Y, Molnar D A. Automated whitebox fuzz testing [C] //Proc of the 16th Network and Distributed System Security Symp. Piseataway, NJ: IEEE, 2008: 151- 166.
  • 7Cadar C, Sen K. Symbolic execution for software testing: Three decades later[J]. Communications of the ACM, 2013, 56(2): 82-90.
  • 8Farooqui N, Schwan K, Yalamanchili S. Efficient instrumentation of GPGPU applications using information flow analysis and symbolic execution [C] //Proc of the 7th Workshop on General Purpose Processing Using GPUs. New York: ACM, 2014:19-27.
  • 9Bugrara S, gngler D. Redundant state detection for dynamic symbolic execulion [C] //Proc of the 21st USENIX Annual Technical Conf. Berkeley, CA: USENIX Association, 2013:199-211.
  • 10Brumley D, Hartwig C, I.iang Z, et al. Automatically identifying trigger-based behavior in malware, CMU- CS-07-105 [R]. Pittsburgh, PA: Carnegie Mellon University, 2007.

引证文献12

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部