Polymorphic Viruses A brief survey Joseph Hamm Shirlan Johnson.

Slides:



Advertisements
Similar presentations
Smita Thaker 1 Polymorphic & Metamorphic Viruses Presented By : Smita Thaker Dated : Nov 18, 2003.
Advertisements

Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
Dr. Richard Ford  Szor 7  Another way viruses try to evade scanners.
Software-based Code Attestation for Wireless Sensors.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
Polymorphism in Computer Viruses CS265 Security Engineering Term Project Puneet Mishra.
Virus Encyption CS 450 Joshua Bostic. topics Encryption as a deterent to virus scans. History of polymorphic viruses. Use of encryption by viruses.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
HUNTING FOR METAMORPHIC ENGINES Mark Stamp & Wing Wong August 5, 2006.
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
Metamorphic Viruses Pat Walpole. Introduction What are metamorphic viruses Why they are dangerous Defenses against them.
Pairwise Alignment of Metamorphic Computer Viruses Student:Scott McGhee Advisor:Dr. Mark Stamp Committee:Dr. David Taylor Dr. Teng Moh.
Learning From Mistakes—A Comprehensive Study on Real World Concurrency Bug Characteristics Shan Lu, Soyeon Park, Eunsoo Seo and Yuanyuan Zhou Appeared.
Anti Virus Techniques Jordan & Ryan Use of Checksum The Binary for key files is added up to a number especially in the boot files When these files are.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Client-Server collaborative scanning Dumitru Codreanu R&D, BitDefender.
Cryptanalysis. The Speaker  Chuck Easttom  
Dr. Richard Ford  Szor 11  Virus Scanners – how they work, why they matter, how to write one…
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Computer Viruses Preetha Annamalai Niranjan Potnis.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
HUNTING FOR METAMORPHIC HUNTING FOR METAMORPHIC Péter Ször and Peter Ferrie Symantec Corporation VIRUS BULLETIN CONFERENCE ©2001 Presented by Stephen Karg.
Structure Classifications &
Windows PE files Infections and Heuristic Detection Nicolas BRULEZ / Digital River PACSEC '04.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer project – computer virus 1D Christy Chan (9) Patricia Cheung (14)
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Hunting for Metamorphic Engines Wing Wong Mark Stamp Hunting for Metamorphic Engines 1.
Telecommunications Networking II Lecture 41f Viruses and Worms.
COMPUTER VIRUS.
Biologically Inspired Defenses against Computer Viruses International Joint Conference on Artificial Intelligence 95’ J.O. Kephart et al.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Christopher Kruegel University of California Engin Kirda Institute Eurecom Clemens Kolbitsch Thorsten Holz Secure Systems Lab Vienna University of Technology.
Description of a New Variable-Length Key, 64-Bit Block Cipher (BLOWFISH) Bruce Schneier BY Sunitha Thodupunuri.
Defending Against Internet Worms: A Signature-Based Approach Aurthors: Yong Tang, and Shigang Chen Publication: IEEE INFOCOM'05 Presenter : Richard Bares.
CISC Machine Learning for Solving Systems Problems Presented by: Sandeep Dept of Computer & Information Sciences University of Delaware Detection.
PHMMs for Metamorphic Detection Mark Stamp 1PHMMs for Metamorphic Detection.
ANITVIRUSES TECHNIQUES
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic Authors: Oleg Kolensnikov and Wenke Lee Published: Technical report, 2005, College.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Polymorphic Worm Detection by Instruction Distribution Kihun Lee HPC Lab., Postech.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
METAMORPHIC VIRUS NGUYEN LE VAN.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Advanced Anti-Virus Techniques
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
W elcome to our Presentation. Presentation Topic Virus.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Computer Viruses Author: Alyse Allen.
Techniques, Tools, and Research Issues
Executive Director and Endowed Chair
Executive Director and Endowed Chair
CSC 382/582: Computer Security
Presentation transcript:

Polymorphic Viruses A brief survey Joseph Hamm Shirlan Johnson

11-Sep-2002CS 6265 Fall 2002 Contents  Prologue  Introduction  The Evolution of Polymorphic Viruses  Polymorphism  Detection  Epilogue

11-Sep-2002CS 6265 Fall 2002 Prologue  1941 –First theories for self-replicating programs  1980s –©Brain (Pakistan) and Stoned (New Zealand) attacks floppy boot sectors – Jerusalem(Israel) – first virus to infect other than.COM &.EXE –Den Zuk (Indonesia) – first “antivirus” virus – removes & inoculates against ©Brain

11-Sep-2002CS 6265 Fall 2002 Prologue  1990s –1 st virus exchange (VX) BBS (Bulgaria) goes online –AT&T (1 st successful critical infrastructure?) attack –Dark Avenger releases 1 st PME – MtE - enables other viruses to morph in over 4,000,000,000 different forms –1 st polymorphic virus appear – Tequila (Switzerland) –Nowhere Man releases Nowhere Utilities which include the Virus Creation Lab (VCL) w/ “Borland interface”

11-Sep-2002CS 6265 Fall 2002 Polymorph Engine - 1  What is a Polymorph Engine?  A program with the abilities to encrypt (or jumble up) another program or data and provide a unique decryptor for it and do this in such a way that no two encryptions of the same program or data will look alike.

11-Sep-2002CS 6265 Fall 2002 Polymorph Engine - 2 A PME typically consists of:  The random number generator.  The junk code generator.  The decryptor generator.

11-Sep-2002CS 6265 Fall 2002 Polymorphism Levels  Level 1 –Viruses having a set of decryptors with constant code, choosing one while infecting.  Level 2 –Virus decryptor contains one or several constant instructions, the rest of it is changeable.  Level 3 –Decryptor contains unused functions- "junk" like NOP, CLI, STI etc.  Level 4 –Decryptor uses interchangeable instructions and changes their order (instructions mixing). –Decryption algorithm remains unchanged.

11-Sep-2002CS 6265 Fall 2002 Polymorphism Levels – Cont’d.  Level 5 –Levels are used, decryption algorithm is changeable, repeated encryption of virus code and even partial encryption of the decryptor code is possible.  Level 6 –Permutating viruses. The main code of the virus is subject to change. It is divided into blocks which are positioned in random order while infecting.  Level 7 –Levels 1 – 6 plus Heuristic, Goat & Emulator counter- measures

11-Sep-2002CS 6265 Fall 2002 Sample Polymorphic Virus Code Sample Polymorphic Virus Code  MOV DX,10 ;Real part of the decryptor!  MOV SI,1234 ;junk  AND AX,[SI+1234] ;junk  CLD ;junk  MOV DI,jumbled_data ;Real part of the decryptor!  TEST [SI+1234],BL ;junk  OR AL,CL ;junk  main_loop: ADD SI,SI ;junk instruction, real loop!  XOR AX,1234 ;junk

11-Sep-2002CS 6265 Fall 2002 Polymorphic Behavior - 1

11-Sep-2002CS 6265 Fall 2002 Polymorphic Behavior - 2

11-Sep-2002CS 6265 Fall 2002 Polymorphic Behavior - 3

11-Sep-2002CS 6265 Fall 2002 Polymorphic Behavior - 4

11-Sep-2002CS 6265 Fall 2002 AV Polymorphic Response - 1  Scan Strings –Work by searching for a pattern of bytes in FIXED positions and a FIXED sequence.  Variable Scan Strings –Work by searching for a pattern of bytes in VARIABLE positions but in a FIXED sequence.  Cryptanalysis –Works by finding part of the VIRUS BODY and then performing some very basic cryptanalysis on it and then decrypting it (if possible).

11-Sep-2002CS 6265 Fall 2002 AV Polymorphic Response - 2  Generic Decryptor (Emulator) –Works by emulating instructions in the polymorphic decryptor in order to make the virus decrypt itself and then it detects the virus by a standard scan string.  Heuristics –Searches for inconsistencies between the code being analyzed and normal everyday code found in programs.

11-Sep-2002CS 6265 Fall 2002 AV Strategy - 1

11-Sep-2002CS 6265 Fall 2002 AV Strategy - 2

11-Sep-2002CS 6265 Fall 2002 AV Strategy - 3

11-Sep-2002CS 6265 Fall 2002 AV Strategy - 4

11-Sep-2002CS 6265 Fall 2002 AV Strategy - 5

11-Sep-2002CS 6265 Fall 2002 Heuristic AV Strategy

11-Sep-2002CS 6265 Fall 2002 VX Response to AV Tactics - 1  Anti Scan String methods –Avoid the use of code common to every decryptor. NOTE: Make enough alternatives so that it makes multiple variable scan strings not an option to AV!  Anti - Cryptanalysis –Simply add multiple encryption –A loop using a single XOR with byte/word is very easy to crypt-analyze but a loop using XOR b/w, ADD b/w, SUB b/w, ROL b/w in one loop is VERY hard to crypt-analyze.

11-Sep-2002CS 6265 Fall 2002 VX Advice to Next Gen  If you are going to make a good engine remember the following points: - It must not have fixed bytes in fixed positions. - It must not have fixed bytes in variable positions. - It must not be able to be decrypted by generic decryption engines in AV software. - It helps if the code is heuristically "clean" but it is not the “be all and end all” of an engine to be this way. - Make sure it is very difficult to analyze by AV. - Make sure next to impossible to remove if it does get caught.

11-Sep-2002CS 6265 Fall 2002 Epilogue  Polymorphic viruses represent yet another escalatory step in the conflict between those who seek to compromise (VX community) and those who defend (AV community) computer systems. As the techniques and strategies improve, one can expect the threat of polymorphic viruses to only increase.

11-Sep-2002CS 6265 Fall 2002 References -1  AVP Virus Encyclopaedia –  History of Computer Viruses by Robert M. Slade –  Understanding & Managing Polymorphic Viruses –  Virus Timeline & Scientific Papers – –

11-Sep-2002CS 6265 Fall 2002 References -2  VX Papers & Articles – –Guide to improving Polymorphic Engines by Rogue Warrior –A General Description of the Methods Behind a Polymorph Engine by The Black Baron  Viruses Revealed by David Harley, etc.

Questions?