TY - JOUR
T1 - Impeding behavior-based malware analysis via replacement attacks to malware specifications
AU - Ming, Jiang
AU - Xin, Zhi
AU - Lan, Pengwei
AU - Wu, Dinghao
AU - Liu, Peng
AU - Mao, Bing
N1 - Funding Information:
We are very grateful to Paolo Milani Comparetti and Christopher Kruegel for providing access to the BCHKK-data dataset. This research was supported in part by the Grants NSF CNS-1223710, NSF CCF-1320605, ONR N00014-13-1-0175, and ARO W911NF-13-1-0421 (MURI). Peng Liu was supported by ARO W911NF-13-1-0421 (MURI), NSF CCF-1320605, CNS-1422594, and NIETP CAE Cybersecurity Grant.
Publisher Copyright:
© 2016, Springer-Verlag France.
PY - 2017/8/1
Y1 - 2017/8/1
N2 - As the underground market of malware flourishes, there is an exponential increase in the number and diversity of malware. A crucial question in malware analysis research is how to define malware specifications or signatures that faithfully describe similar malicious intent and also clearly stand out from other programs. Although the traditional malware specifications based on syntactic signatures are efficient, they can be easily defeated by various obfuscation techniques. Since the malicious behavior is often stable across similar malware instances, behavior-based specifications which capture real malicious characteristics during run time, have become more prevalent in anti-malware tasks, such as malware detection and malware clustering. This kind of specification is typically extracted from the system call dependence graph that a malware sample invokes. In this paper, we present replacement attacks to camouflage similar behaviors by poisoning behavior-based specifications. The key method of our attacks is to replace a system call dependence graph to its semantically equivalent variants so that the similar malware samples within one family turn out to be different. As a result, malware analysts have to put more efforts into reexamining the similar samples which may have been investigated before. We distil general attacking strategies by mining more than 5200 malware samples’ behavior specifications and implement a compiler-level prototype to automate replacement attacks. Experiments on 960 real malware samples demonstrate the effectiveness of our approach to impede various behavior-based malware analysis tasks, such as similarity comparison and malware clustering. In the end, we also discuss possible countermeasures in order to strengthen existing malware defense.
AB - As the underground market of malware flourishes, there is an exponential increase in the number and diversity of malware. A crucial question in malware analysis research is how to define malware specifications or signatures that faithfully describe similar malicious intent and also clearly stand out from other programs. Although the traditional malware specifications based on syntactic signatures are efficient, they can be easily defeated by various obfuscation techniques. Since the malicious behavior is often stable across similar malware instances, behavior-based specifications which capture real malicious characteristics during run time, have become more prevalent in anti-malware tasks, such as malware detection and malware clustering. This kind of specification is typically extracted from the system call dependence graph that a malware sample invokes. In this paper, we present replacement attacks to camouflage similar behaviors by poisoning behavior-based specifications. The key method of our attacks is to replace a system call dependence graph to its semantically equivalent variants so that the similar malware samples within one family turn out to be different. As a result, malware analysts have to put more efforts into reexamining the similar samples which may have been investigated before. We distil general attacking strategies by mining more than 5200 malware samples’ behavior specifications and implement a compiler-level prototype to automate replacement attacks. Experiments on 960 real malware samples demonstrate the effectiveness of our approach to impede various behavior-based malware analysis tasks, such as similarity comparison and malware clustering. In the end, we also discuss possible countermeasures in order to strengthen existing malware defense.
UR - http://www.scopus.com/inward/record.url?scp=84973626395&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84973626395&partnerID=8YFLogxK
U2 - 10.1007/s11416-016-0281-3
DO - 10.1007/s11416-016-0281-3
M3 - Article
AN - SCOPUS:84973626395
SN - 2274-2042
VL - 13
SP - 193
EP - 207
JO - Journal of Computer Virology and Hacking Techniques
JF - Journal of Computer Virology and Hacking Techniques
IS - 3
ER -