Automated analysis of system-wide malware propagation

<p>In contrast to most benign applications, malware infects its host system. It does so via system-wide execution by injecting code into otherwise benign applications, executing via code-reuse attacks, dynamically generating code and much more. These unconventional, albeit perfectly valid, exe...

Full description

Bibliographic Details
Main Author: Korczynski, D
Other Authors: Roscoe, B
Format: Thesis
Published: 2019
_version_ 1797102754254028800
author Korczynski, D
author2 Roscoe, B
author_facet Roscoe, B
Korczynski, D
author_sort Korczynski, D
collection OXFORD
description <p>In contrast to most benign applications, malware infects its host system. It does so via system-wide execution by injecting code into otherwise benign applications, executing via code-reuse attacks, dynamically generating code and much more. These unconventional, albeit perfectly valid, execution paradigms are used for evasion and obfuscation tactics and pose significant problems to automatic malware analysis environments.</p> <p>In this thesis, we investigate the problem of system-wide malware execution. We focus on building general and precise techniques to analyse malware that execute throughout the entire system. To demonstrate our techniques, we implement them as part of a malware analysis system called Minerva. We use Minerva to perform extensive empirical studies based on synthetic benchmarks that explore corner-case behaviours as well as real-world malware samples collected from the wild.</p> <p>The core idea behind our techniques is to analyse system-wide malware execution with a bottom-up approach. To this end, we develop a fundamental technique for capturing the system-wide execution trace of a given malware sample that is independent of the techniques malware use to propagate through the system. We then incrementally build abstractions upon this trace to identify code injections, malware droppers, code-reuse attacks, packed malware and more.</p> <p>In the final part of our thesis, we extend Minerva with several capabilities to perform large-scale studies. We use these features to characterise system-wide malware propagation at large and extract many interesting high-level views on malware based on our precise and general analysis.</p>
first_indexed 2024-03-07T06:10:17Z
format Thesis
id oxford-uuid:ef3faf5e-7733-4460-bba4-9e18893dec1e
institution University of Oxford
last_indexed 2024-03-07T06:10:17Z
publishDate 2019
record_format dspace
spelling oxford-uuid:ef3faf5e-7733-4460-bba4-9e18893dec1e2022-03-27T11:38:55ZAutomated analysis of system-wide malware propagationThesishttp://purl.org/coar/resource_type/c_db06uuid:ef3faf5e-7733-4460-bba4-9e18893dec1eORA Deposit2019Korczynski, DRoscoe, BO’Halloran, C<p>In contrast to most benign applications, malware infects its host system. It does so via system-wide execution by injecting code into otherwise benign applications, executing via code-reuse attacks, dynamically generating code and much more. These unconventional, albeit perfectly valid, execution paradigms are used for evasion and obfuscation tactics and pose significant problems to automatic malware analysis environments.</p> <p>In this thesis, we investigate the problem of system-wide malware execution. We focus on building general and precise techniques to analyse malware that execute throughout the entire system. To demonstrate our techniques, we implement them as part of a malware analysis system called Minerva. We use Minerva to perform extensive empirical studies based on synthetic benchmarks that explore corner-case behaviours as well as real-world malware samples collected from the wild.</p> <p>The core idea behind our techniques is to analyse system-wide malware execution with a bottom-up approach. To this end, we develop a fundamental technique for capturing the system-wide execution trace of a given malware sample that is independent of the techniques malware use to propagate through the system. We then incrementally build abstractions upon this trace to identify code injections, malware droppers, code-reuse attacks, packed malware and more.</p> <p>In the final part of our thesis, we extend Minerva with several capabilities to perform large-scale studies. We use these features to characterise system-wide malware propagation at large and extract many interesting high-level views on malware based on our precise and general analysis.</p>
spellingShingle Korczynski, D
Automated analysis of system-wide malware propagation
title Automated analysis of system-wide malware propagation
title_full Automated analysis of system-wide malware propagation
title_fullStr Automated analysis of system-wide malware propagation
title_full_unstemmed Automated analysis of system-wide malware propagation
title_short Automated analysis of system-wide malware propagation
title_sort automated analysis of system wide malware propagation
work_keys_str_mv AT korczynskid automatedanalysisofsystemwidemalwarepropagation