Using Engine Signature to Detect Metamorphic Malware Mohamed R. Chouchane and Arun Lakhotia Software Research Laboratory The University of Louisiana at.

Slides:



Advertisements
Similar presentations
ByteWeight: Learning to Recognize Functions in Binary Code
Advertisements

Smita Thaker 1 Polymorphic & Metamorphic Viruses Presented By : Smita Thaker Dated : Nov 18, 2003.
Mutating The Mutators Sean O'Toole. What is Borrowed From Metamorphism Metamorphic Shrinker\Expander Modules: Expander: An expander creates a “direct.
Arun Lakhotia, Professor Andrew Walenstein, Assistant Professor University of Louisiana at Lafayette AVAR (New Delhi)1.
NASM Preprocessor. NASM preprocessor  NASM contains a powerful macro processor, which supports conditional assembly, multi-level file inclusion, two.
Polymorphism in Computer Viruses CS265 Security Engineering Term Project Puneet Mishra.
HUNTING FOR METAMORPHIC ENGINES Mark Stamp & Wing Wong August 5, 2006.
Web siteWeb site ExamplesExamples Irvine, Kip R. Assembly Language for Intel-Based Computers, Stack Operations Runtime Stack PUSH Operation POP.
0wning Antivirus Alex Wheeler Neel Mehta
Beyond Anti-Virus by Dan Keller Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”
Automated malware classification based on network behavior
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Over the last years, the amount of malicious code (Viruses, worms, Trojans, etc.) sent through the internet is highly increasing. Due to this significant.
Software Analysis & Deobfuscation Engine. Page  2  Project Name: SADE  Project Members: Faiza Khalid, Komal Babar and Abdul Wahab  Project Supervisor.
Dr. XiaoFeng Wang AGIS: Towards Automatic Generation of Infection Signatures Zhuowei Li 1,3, XiaoFeng Wang 1, Zhenkai Liang 4 and Mike Reiter 2 1 Indiana.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Computer Viruses Preetha Annamalai Niranjan Potnis.
Department of Computer Science Yasmine Kandissounon.
CajunBot: Past and Future Arun Lakhotia The Center for Advanced Computer Studies.
Dr. José M. Reyes Álamo 1.  The 80x86 memory addressing modes provide flexible access to memory, allowing you to easily access ◦ Variables ◦ Arrays ◦
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
HUNTING FOR METAMORPHIC HUNTING FOR METAMORPHIC Péter Ször and Peter Ferrie Symantec Corporation VIRUS BULLETIN CONFERENCE ©2001 Presented by Stephen Karg.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Today’s topics Parameter passing on the system stack Parameter passing on the system stack Register indirect and base-indexed addressing modes Register.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Assembly Language for Intel-Based Computers, 6 th Edition Chapter 8: Advanced Procedures (c) Pearson Education, All rights reserved. You may.
Hunting for Metamorphic Engines Wing Wong Mark Stamp Hunting for Metamorphic Engines 1.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
Malware Analysis Jaimin Shah & Krunal Patel Vishal Patel & Shreyas Patel Georgia Institute of Technology School of Electrical and Computer Engineering.
Statistical Tools for Linking Engine-generated Malware to its Engine Edna C. Milgo M.S. Student in Applied Computer Science TSYS School of Computer Science.
Jeffrey Zheng School of Software, Yunnan University August 4, nd International Summit on Integrative Biology August 4-5, 2014 Chicago, USA.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Normalizing Metamorphic Malware Using Term Rewriting A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia Software Research Laboratory The University.
CISC Machine Learning for Solving Systems Problems Presented by: Sandeep Dept of Computer & Information Sciences University of Delaware Detection.
Analyzing Memory Accesses in Obfuscated x86 Executables Michael Venable Mohamed R. Choucane Md. Enamul Karim Arun Lakhotia (Presenter) DIMVA 2005 Wien.
Microprocessors The ia32 User Instruction Set Jan 31st, 2002.
Chapter 3 Syntax, Errors, and Debugging Fundamentals of Java.
Results of the 2000 Topic Detection and Tracking Evaluation in Mandarin and English Jonathan Fiscus and George Doddington.
Forensic Analysis of Toolkit-Generated Malicious Programs Yasmine Kandissounon TSYS School of Computer Science Columbus State University 2009 ACM Mid-Southeast.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
nd Joint Workshop between Security Research Labs in JAPAN and KOREA Polymorphic Worm Detection by Instruction Distribution Kihun Lee HPC Lab., Postech.
Binary Context-Sensitive Recognizer (BCSR) Hong Pham December 4, 2007.
Overview of Back-end for CComp Zhaopeng Li Software Security Lab. June 8, 2009.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
2014 Unsupervised Malware Classification: How Bad Software Can Find its own Kind Shannon Steinfadt, Ph.D., Juston Moore, Micah Yates Los Alamos National.
Paradyn Project Paradyn / Dyninst Week Madison, Wisconsin April 12-14, 2010 Paradyn Project Safe and Efficient Instrumentation Andrew Bernat.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
October 20-23rd, 2015 Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features Joshua Saxe, Dr. Konstantin Berlin Invincea.
Automatic Extraction of Malicious Behaviors
Techniques, Tools, and Research Issues
Techniques, Tools, and Research Issues
Techniques, Tools, and Research Issues
Techniques, Tools, and Research Issues
Auburn University COMP7330/7336 Advanced Parallel and Distributed Computing Data Partition Dr. Xiao Qin Auburn University.
Techniques, Tools, and Research Issues
143A: Principles of Operating Systems Lecture 4: Calling conventions
Assembler, Compiler, Interpreter
Chap 10 Malicious Software.
تحلیل ساختاری ویروس‌های کامپیوتری از تئوری تا کاربرد
CajunBot: Tech Challenges
Detecting Obfuscated Code Using Cosine Similarity
Challenges in Building and Detecting Portable Source Code Morphers
Assembler, Compiler, Interpreter
Chap 10 Malicious Software.
Fourier Transform of Boundaries
Normalizing Metamorphic Malware Using Term Rewriting
Computer Architecture and System Programming Laboratory
Julius Inigo MIS 304 November 10, 2011
Presentation transcript:

Using Engine Signature to Detect Metamorphic Malware Mohamed R. Chouchane and Arun Lakhotia Software Research Laboratory The University of Louisiana at Lafayette Fourth Workshop on Rapid Malcode (WORM) November 3rd, 2006 George Mason University, Fairfax, VA, USA

SCAM'062 9/28/2006 Metamorphic Malware Virus Form - C M M Virus Form - A Form - B Metamorphic malware changes as it propagates It creates multiple variants of itself

SCAM'063 9/28/2006 Metamorphic Malware Challenge Signature Virus Form - C M M Virus Form - A Form - B Too many signatures challenge the AV Scanner Using different signatures for most variants cannot scale. Antivirus scanners using extracted byte sequences, or “signatures” to identify known malware.

WORM'064 11/03/2006 Engine Signature: Track Variants to their Engine One Engine  Source of Variation Engine-friendly code is “Code written for the engine” Idea: Engine Signature vs. Virus Signature  Lightens burden of one signature per variant  Analogous to determining likelihood of engine authorship E-friendly malware release feedback Engine variant

WORM'065 11/03/2006 Engine-Friendliness 10% friendly20% friendly90% friendly100% friendly Low E-friendliness Input Variants Output Variants Metamorphic Engine Instruction Substitution Garbage Insertion

WORM'066 11/03/2006 Code Substitution: Evol mov [esi+4], 9  mov esi+4], 6 add esi+4], 3 mov [ebp+8], ecx  push eax mov eax, ecx mov [ebp+8], eax pop eax push 4  mov eax, 4 push eax push eax  push eax mov eax, 2Bh Clues

WORM'067 11/03/2006 Scoring Function S E (V)=  c  s w c e cs / |V| S E (V) measures how dense a code segment V is with clues from some code-substituting engine E. Clues are weighted according to their length. Can explore other weight assignments Code Segment Clue Count per Site push 7 mov 2 sub 0 mov 0 pop 0 mov 2 add 0 mov 2 add 0 push 8 mov 2 add 0 mov 2 add 0 pop 0 S E = 25/15 =1.667

WORM'068 11/03/2006 Evaluation: Non-Evol Segments Frequency distributions of the scores of 2nd to 7th generation with initial E-friendliness 5%(figure at left) and 50% (figure at right) The E-friendlier the Eve, the higher the score Later variants tend to score higher “Convergence” behavior

WORM'069 11/03/2006 Evaluation: Simulated Evol Segments Frequency distributions of the scores of 2nd to 4th generations (left to right) of simulated Evol variants Certain range of values Gaussian Like 2 nd, 3 rd, and 4 th gen variants scored 1.62, 1.95, and 2.13, respectively

WORM' /03/2006 Discussion Limitations  Small clues  Less transformation options  Low friendliness  Malware open to traditional signature scanning  More analysis may be needed Improvement and Further work  Investigate other weight assignments  Investigate engines which expand and shrink code  Functional relationship among parameters  Use engine signature to determine toolkit authorship

WORM' /03/2006 Software Research Lab Center for Advanced Computer Studies University of Louisiana at Lafayette Arun Lakhotia Director Andrew Walenstein Research Scientist Michael Venable Software Engineer and Alumnus Ph.D. Students Mohamed R. Chouchane Md Enamul Karim M.S. Students Matthew Hayes Christopher Thompson Alumni Nitin Jyoti, Avertlabs Aditya Kapoor, McAfee Erik Uday Kumar, Authentium Rachit Mathur, McAfee Moinuddin Mohammed, Microsoft Prashant Pathak, Symantec Prabhat Singh, Symantec Funded by: Louisiana Governor’s IT Initiative

WORM' /03/2006 more at “Using Engine Signature to Detect Metamorphic Malware” Mohamed R. Chouchane and Arun Lakhotia Software Research Laboratory The University of Louisiana at Lafayette