skip to main content
10.1145/1455770.1455779acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Ether: malware analysis via hardware virtualization extensions

Authors Info & Claims
Published:27 October 2008Publication History

ABSTRACT

Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplies signatures to detection systems and provides evidence for recovery and cleanup. The focal point in the malware analysis battle is how to detect versus how to hide a malware analyzer from malware during runtime. State-of-the-art analyzers reside in or emulate part of the guest operating system and its underlying hardware, making them easy to detect and evade. In this paper, we propose a transparent and external approach to malware analysis, which is motivated by the intuition that for a malware analyzer to be transparent, it must not induce any side-effects that are unconditionally detectable by malware. Our analyzer, Ether, is based on a novel application of hardware virtualization extensions such as Intel VT, and resides completely outside of the target OS environment. Thus, there are no in-guest software components vulnerable to detection, and there are no shortcomings that arise from incomplete or inaccurate system

emulation. Our experiments are based on our study of obfuscation techniques used to create 25,000 recent malware samples. The results show that Ether remains transparent and defeats the obfuscation tools that evade existing approaches.

References

  1. Anubis: Analyzing Unknown Binaries. http://anubis.seclab.tuwien.ac.at.Google ScholarGoogle Scholar
  2. Armadillo. http://www.siliconrealms.com.Google ScholarGoogle Scholar
  3. BitBlaze Binary Analysis Platform. http://bitblaze.cs.berkeley.edu.Google ScholarGoogle Scholar
  4. DYNINST API. http://www.dyninst.org.Google ScholarGoogle Scholar
  5. FileMon for Windows. http://technet.microsoft.com/en-us/sysinternals/bb896642.aspx.Google ScholarGoogle Scholar
  6. Intel Virtualization Technology. http://www.intel.com/technology/virtualization.Google ScholarGoogle Scholar
  7. PEiD. http://www.peid.info.Google ScholarGoogle Scholar
  8. PEiDSO. http://handlers.sans.org/jclausing/userdb.txt.Google ScholarGoogle Scholar
  9. RegMon for Windows. http://technet.microsoft.com/en-us/sysinternals/bb896652.aspx.Google ScholarGoogle Scholar
  10. Themida. http://www.oreans.com/themida.php.Google ScholarGoogle Scholar
  11. VirtualPC. http://www.microsoft.com/windows/products/winfamily/virtualpc/.Google ScholarGoogle Scholar
  12. VMWare. http://www.vmware.com.Google ScholarGoogle Scholar
  13. Norman Sandbox Whitepaper. http://www.norman.com/documents/wp_sandbox.pdf, 2003.Google ScholarGoogle Scholar
  14. AMD64 Architecture Programmer's Manual, Volume 2: System Programming, 2007.Google ScholarGoogle Scholar
  15. TEMU: The BitBlaze Dynamic Analysis Component. http://bitblaze.cs.berkeley.edu/temu.html, 2007.Google ScholarGoogle Scholar
  16. P. Bacher, T. Holz, M. Kotter, and G. Wicherski. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/bots, 2005.Google ScholarGoogle Scholar
  17. M. Bailey, J. Oberheide, J. Andersen, Z. M. Mao, F. Jahanian, and J. Nazario. Automated Classification and Analysis of Internet Malware. In RAID, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In SOSP, pages 164--177, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. U. Bayer, C. Kruegel, and E. Kirda. TTanalyze: A Tool for Analyzing Malware. In EICAR, pages 180--192, 2006.Google ScholarGoogle Scholar
  20. F. Bellard. QEMU, a Fast and Portable Dynamic Translator. In ATEC, pages 41--41, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 2003.Google ScholarGoogle Scholar
  22. K. Borders, X. Zhao, and A. Prakash. Siren: Catching Evasive Malware (Short Paper). In S&P (Oakland), pages 78--85, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis. In CCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant. Semantics-Aware Malware Detection. In S&P (Oakland), pages 32--46, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Christodorescu, C. Kruegel, and S. Jha. Mining Specifications of Malicious Behavior. In ESEC/FSE, pages 5--14, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. P. Ferrie. Attacks on Virtual Machine Emulators. Symantec Advanced Threat Research, 2006.Google ScholarGoogle Scholar
  27. P. Ferrie. Attacks on More Virtual Machines. http://pferrie.tripod.com/papers/attacks2.pdf, 2007.Google ScholarGoogle Scholar
  28. T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In NDSS, 2003.Google ScholarGoogle Scholar
  29. G. Hunt and D. Brubacher. Detours: Binary Interception of Win32 Functions. In WINSYM, pages 135--143, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. X. Jiang, X. Wang, and D. Xu. Stealthy Malware Detection Through VMM-Based "Out-of-the-Box" Semantic View Reconstruction. In CCS, pages 128--138, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. X. Jiang, D. Xu, H. J. Wang, and E. H. Spafford. Virtual Playgrounds for Worm Behavior Investigation. In RAID, pages 1--21, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M.G. Kang, P. Poosankam, and H. Yin. Renovo: A Hidden Code Extractor for Packed Executables. In WORM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. C. Kruegel, W. Robertson, and G. Vigna. Detecting Kernel-Level Rootkits Through Binary Analysis. In ACSAC, pages 91--100, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. L. Martignoni, M. Christodorescu, and S. Jha. OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. In ACSAC, pages 431--441, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  35. F. Perigaud. New Pill? http://cert.lexsi.com/weblog/index.php/2008/03/21/223-new-pill, 2008.Google ScholarGoogle Scholar
  36. N. Provos and T. Holz. Virtual Honeypots: From Botnet Tracking to Intrusion Detection. Addison-Wesley Professional, Reading, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. T. Ptacek. Side-Channel Detection Attacks Against Unauthorized Hypervisors. http://www.matasano.com/log/930/side-channel-detection-attacks-against-unauthorized-hypervisors/, 2007.Google ScholarGoogle Scholar
  38. D. Quist and Valsmith. Covert Debugging: Circumventing Software Armoring. In Black Hat USA, 2007.Google ScholarGoogle Scholar
  39. T. Raffetseder, C. Kruegel, and E. Kirda. Detecting System Emulators. In ISC, pages 1--18, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. P. Royal, M. Halpin, D. Dagon, R. Edmonds, and W. Lee. PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. In ACSAC, pages 289--300, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. M. Sipser. Introduction to the Theory of Computation. International Thomson Publishing, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. P. Szor. The Art of Computer Virus Research and Defense. Addison-Wesley Professional, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. A. Vasudevan and R. Yerraballi. Stealth Breakpoints. In ACSAC, pages 381--392, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. A. Vasudevan and R. Yerraballi. Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. In S&P (Oakland), pages 264--279, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. C. Wang and S. Ju. The Dilemma of Covert Channels Searching. In ICISC, pages 169--174, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. In NDSS, 2006.Google ScholarGoogle Scholar
  47. C. Willems, T. Holz, and F. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security and Privacy, 5(2), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In CCS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ether: malware analysis via hardware virtualization extensions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '08: Proceedings of the 15th ACM conference on Computer and communications security
        October 2008
        590 pages
        ISBN:9781595938107
        DOI:10.1145/1455770

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 October 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '08 Paper Acceptance Rate51of280submissions,18%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader