UNCLASSIFIED © 2011 Carnegie Mellon University Building Malware Infection Trees Jose Andre Morales 1, Michael Main 2, Weilang Luo 3, Shouhuai Xu 2,3, Ravi.

Slides:



Advertisements
Similar presentations
Operating-System Structures
Advertisements

Analyzing and Exploiting Network Behaviors of Malware Jose Andre Morales Areej Al-Bataineh Shouhuai XuRavi Sandhu SecureComm Singapore, 2010 ©2010 Institute.
Analyzing DNS Activities of Bot Processes Dr. Jose Andre Morales Areej Al-Bataineh Dr. Shouhuai Xu Dr.Ravi Sandhu 4th International Conference on Malicious.
Symptoms-Based Detection of Bot Processes Jose Andre MoralesErhan Kartaltepe Shouhuai XuRavi Sandhu MMM-ACNS – St Petersburg, Russia 2010 ©2010 Institute.
OpenGL Course Notes Chapter 1: Introduction Jim Mims.
INTRODUCTION TO SIMULATION WITH OMNET++ José Daniel García Sánchez ARCOS Group – University Carlos III of Madrid.
Carnegie Mellon University Software Engineering Institute CERT® Knowledgebase Copyright © 1997 Carnegie Mellon University VU#14202 UNIX rlogin with stack.
© 2013 Carnegie Mellon University UFO: From Underapproximations to Overapproximations and Back! Arie Gurfinkel (SEI/CMU) with Aws Albarghouthi and Marsha.
© 2014 Microsoft Corporation. All rights reserved.
© 2011 Carnegie Mellon University System of Systems V&V John B. Goodenough October 19, 2011.
Analyzing Malware Detection Efficiency with Multiple Anti-Malware Programs Dr. Jose A. Morales – Software Engineering Institute, Carnegie Mellon University.
© 2010 Carnegie Mellon University B OXES : A Symbolic Abstract Domain of Boxes Arie Gurfinkel and Sagar Chaki Software Engineering Institute Carnegie Mellon.
Chap 2 System Structures.
© 2013 Carnegie Mellon University Academy for Software Engineering Education and Training, 2013 Session Architect: Tony Cowling Session Chair: Nancy Mead.
© 2010 Carnegie Mellon University ® CMMI is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University. V&V Principles Verification.
Analyzing Malware Detection Effectiveness with Multiple Anti- Malware Programs Shouhuai Xu UTSA Ravi Sandhu UTSA Jose A. Morales CMU.
Computer Viruses Theory and Experiments By Dr. Frederick B. Cohen Presented by Jose Andre Morales.
© 2011 Carnegie Mellon University Should-Cost: A Use for Parametric Estimates Additional uses for estimation tools Presenters:Bob Ferguson (SEMA) Date:November.
Introduction to Alice Basics : What is Alice? Object Oriented Definitions What Does it Look Like? Where Can I Use it?
© 2011 Carnegie Mellon University QUELCE: Quantifying Uncertainty in Early Lifecycle Cost Estimation Presenters:Dave Zubrow PhD Bob Ferguson (SEMA) Date:November.
Jul The New Geant4 License J. Perl The New Geant4 License Makes clear the user’s wide- ranging freedom to use, extend or redistribute Geant4, even.
Architecture of Grid File System (GFS) - Based on the outline draft - Arun swaran Jagatheesan San Diego Supercomputer Center Global Grid Forum 11 Honolulu,
Ipek Ozkaya, COCOMO Forum © 2012 Carnegie Mellon University Affordability and the Value of Architecting Ipek Ozkaya Research, Technology.
Evaluating Detection & Treatment Effectiveness of Commercial Anti-Malware Programs Jose Andre Morales, Ravi Sandhu, Shouhuai Xu Institute for Cyber Security.
Vital Signs: Performance Monitoring Windows Server
© 2010 Carnegie Mellon University Team Software Process.
Conditions and Terms of Use
© 2012 Microsoft Corporation. All rights reserved.
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
Demo. Overview Overall the project has two main goals: 1) Develop a method to use sensor data to determine behavior probability. 2) Use the behavior probability.
Doc.: IEEE /0866r1 Submission September 2005 Michael Montemurro, Chantry NetworksSlide 1 Mobility Domain Definition and Description Notice: This.
Providing Policy Control Over Object Operations in a Mach Based System By Abhilash Chouksey
CSC-682 Cryptography & Computer Security Sound and Precise Analysis of Web Applications for Injection Vulnerabilities Pompi Rotaru Based on an article.
Digital Intuition Cluster, Smart Geometry 2013, Stylianos Dritsas, Mirco Becker, David Kosdruy, Juan Subercaseaux Setup Instructions Overview 1. License.
1 Introduction to Software Engineering Lecture 1.
Unit-1 Introduction Prepared by: Prof. Harish I Rathod
Operating System What is an Operating System? A program that acts as an intermediary between a user of a computer and the computer hardware. An operating.
National Alliance for Medical Image Computing Licensing in NAMIC 3 requirements from NCBC RFA (paraphrased)
What is Access?. “Copyright and Terms of Service Copyright © Texas Education Agency. The materials found on this website are copyrighted © and trademarked.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Author Software Engineering Institute
Lection №4 Development of the Relational Databases.
VIGNAN'S NIRULA INSTITUTE OF TECHNOLOGY & SCIENCE FOR WOMEN TOOLS LINKS PRESENTED BY 1.P.NAVEENA09NN1A A.SOUJANYA09NN1A R.PRASANNA09NN1A1251.
1 XIII: Electronic Resources Managing Trials and Evaluations.
Doc.: IEEE /0340r0 Submission April 2005 Marianna Goldhammer, AlvarionSlide 1 CBP-SG Contention Based Protocol and QoS Notice: This document.
1 PDA Management in Alma Network Zone. 2 Copyright Statement All of the information and material inclusive of text, images, logos, product names is either.
MOPS: an Infrastructure for Examining Security Properties of Software Authors Hao Chen and David Wagner Appears in ACM Conference on Computer and Communications.
The Value of USAP in Software Architecture Design Presentation by: David Grizzanti.
Design and Implementation MAC in Security Operating System CAI Yi, ZHENG Zhi-rong, SHEN Chang-xiang Presented By, Venkateshwarlu Jangili. 1.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
October 20-23rd, 2015 Sandboxing and Reasoning on Malware Infection Trees Kris Ghosh 1, Jose Morales 2, Will Casey 2 and Bud Mishra 3 1. Miami University.
1 CERT BFF: From Start To PoC June 09, 2016 © 2016 Carnegie Mellon University This material has been approved for public release and unlimited distribution.
1 Introduction to Remote Storage Yoel Kortick Senior Librarian.
Secure Software Workforce Development Panel Session
Computer Safety and Ethics
David Svoboda & Aaron Ballman
Models for Resources and Management
Chapter 5 System modeling
Michael Spiegel, Esq Timothy Shimeall, Ph.D.
Institute for Cyber Security
Architecture Concept Documents
Patron Driven Acquisition (PDA) Demand Driven Acquisition (DDA)
How to configure and use the Holdings record Accession Number
Software Configuration Management
Metrics-Focused Analysis of Network Flow Data
QUELCE: Quantifying Uncertainty in Early Lifecycle Cost Estimation
Dynamic Cyber Training with Moodle
An Introduction to Software Architecture
Test Case Test case Describes an input Description and an expected output Description. Test case ID Section 1: Before execution Section 2: After execution.
© Healthcare Inspirations. All rights reserved
Presentation transcript:

UNCLASSIFIED © 2011 Carnegie Mellon University Building Malware Infection Trees Jose Andre Morales 1, Michael Main 2, Weilang Luo 3, Shouhuai Xu 2,3, Ravi Sandhu 2,3 1 Software Engineering Institute, Carnegie Mellon University * 2 Institute for Cyber Security, University of Texas at San Antonio 3 Department of Computer Science, University of Texas at San Antonio * Research performed in the University of Texas at San Antonio

2 Introduction - 1 Present an abstract approach creating malware infection trees (MiT) effectively & efficiently Capture relevant processes & files created/modified during execution Construction primarily based on rules describing fundamental malware infection execution events Gives meaningful understanding of malware infection & identifies involved processes Implemented on Windows Vista OS Useful in disinfection and analysis

3 Contributions Propose an abstract approach to building malware infection trees (MiTs). Define execution event rules describing essential components of infection strategies. Describe implementation in the Windows Vista OS User and Kernel levels.

4 Strong & Weak Bonds Based on observed interaction between processes and files during execution Establishes meaningful relationship between nodes, justifying their addition to MiT Strong Bond between Q & P: Transitivity (transfer) of data from Q to P, creates an intersection between Q & P where both have a subset of identical data Weak Bond: Node Q creates a node P with no transfer of data, this becomes a creator/created relationship with no intersection of identical data between both A strongly bonded tree Contains processes & files directly descending from original malware executable possibly essential to infection strategies Enhanced with weak bonds contains non-direct descendants and possibly non-essential files & process

5 Construction Rules Set of rules defining when a node is added to a MiT primarily based on fundamental definitions of malware (cohen, adleman) Rules facilitate strong & weak bonds resulting in highly relevant MiT with minimal non-essential items included Generalized for use on multiple OS’s  not OS specific New rules can be added Node N is a file or currently running process Edge E is an observed rule between nodes N1 and N2, where N2 is newly added to the MiT Sample under analysis assumed Root of MiT Assumption: Malware primarily infects through file & process manipulation File system & Process rules

6 File System Rules Captures malware self replication & arbitrary file creation Self replication considered essential to malware infection and propagation 3 rules currently defined F1:Infection via self replication, strong bond F2:Infection via arbitrary file creation, weak bond F3:Infection via arbitrary file write modification, weak bond

7 Process Rules Capture malware’s manipulation of processes for nefarious uses Dynamic code injection Process Spawning 2 rules currently defined P1: Infection via dynamic code injection of a currently running process, strong bond Targets already running (benign) processes P2: Infection via process spawning, weak bond Spawned from malware related (created or downloaded) executable file

8 Windows Vista Implementation MiTCoN: tool which outputs MiT tables in real time using dynamic analysis Command line with absolute path of file to analyze Detects rule occurrence through SSDT hooking in the Windows Vista Kernel, runs as a kernel service. Produces very robust MiT tables in under 5 minutes Tables later converted to graphical tree representation

9 File System Rules - Implementation 1 st set to detect F1 (self replication) 2 nd set to detect F1 F2 (arb. File create)  ZwCreateFile(sourcepath) != caller process F3 (arb. File write/mod)  2 nd Set, ZwReadFile(sourcepath) != caller process

10 Process Rules - Implementation P1: dynamic code injection P2: Spawn process 1 st sequence 2 nd sequence (service creation)

11 MiTCoN Example: BackDoor.Win32.Poison

12 Evaluation & Results Built MiTs for 5800 diverse samples from GFI Sandbox Malware Repository 3 min execution; max cpu: 3%, avg. cpu ~1%; max RAM: 14mb; MiT create max: ~7sec, avg. 3.1sec Rule occurrence – F1:662, F2:14396, F3:38629, P1:647, P2:3490 Rule time occurrence max: 200ms, avg.: 12ms; f1 11ms avg; p1 14ms avg. Most common sequence: F1,P2

13 Evaluation & Results 120 samples analyzed by Anubis and GFI Sandbox compared to out MiTs 114 had nodes in both not recorded in the MiT these nodes were files and/or processes belonging to standard Windows and not part of the malware infection  false positives Example: services.exe

14 Evaluation & Results Attempted disinfection on the 120 samples 1. Each sample executed and MiT constructed, VM image scanned by Kaspersky 2. Each sample executed and files/processes appearing in MiT were erased from VM image then scanned by Kaspersky 100% success, in 2. Kaspersky did not detect any malware presence Implies our MiT sufficed to remove malware infection from system

15 Evaluation & Results Multiple occurrences of strong bonds, may suffice to understand essential infection strategy Efficient and Effective MiT construction based on fundamental malware infection creates relevant MiTs excluding files and processes of standard Windows operations. The high frequency, early occurrence and low false positives makes our rules for building MiTs highly effective in analyzing malware. Our disinfection produce 100% success, MiTs may be useful in aiding disinfection efforts

16 Conclusions & Future Work Abstract approach to create MiTs produce relevant meaningful description of infection strategy Construction rules drawn from fundamental malware definitions focusing on infection strategies Generalized and Extensible, OS independent Highly efficient construction, very low resource usage, fast construction time MiTs strong bonds included essential players of infection, minimized inclusion of non-infection related processes and files Effective in disinfection, can aide other disinfection strategies Future work involves expanding the rule set, testing sound and completeness, experiments in real and virtual environments

17 Questions? ¿Preguntas? 質問 ВопросыВопросы Sawaal Domande Soru ΕρωτήσειςΕρωτήσεις 問題

18 CMU copyright statement NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS FURNISHED ON AN “AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder. This Presentation may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at This work was created in the performance of Federal Government Contract Number FA C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The Government of the United States has a royalty-free government- purpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copyright license under the clause at

19

20

21