Reducing Malware Analysis Overhead with Coverings

IEEE Transactions on Dependable and Secure Computing(2023)

引用 0|浏览7
暂无评分
摘要
There is a substantial and growing body of malware samples that evade automated analysis and detection tools. Malware may measure fingerprints (“artifacts”) of the underlying analysis tool or environment, and change their behavior when such artifacts are detected. While analysis tools can mitigate artifacts to reduce exposure, such concealment is expensive and limits scalable automated malware analysis. However, not every sample checks for every type of artifact—analysis efficiency can be improved by mitigating only those artifacts most likely to be used by a sample. Using that insight, we propose Mimosa , a system that identifies a small set of “covering” configurations that collectively and efficiently defeat most malware samples in a corpus. Mimosa identifies a set of configurations that maximize analysis throughput and detection accuracy while minimizing manual effort, enabling scalable automation for analyzing stealthy malware. We evaluate our approach against a benchmark of 1535 meticulously labeled stealthy malware samples. We further test our approach on an additional set of 1221 stealthy malware samples and successfully analyze nearly 99% of them using only 2 VM backends. Mimosa provides a practical, tunable method for efficiently deploying malware analysis resources.
更多
查看译文
关键词
Malware analysis,covering sets,artifact mitigation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要