Detection Techniques for DBI Environment in Windows

Author:

Park Seongwoo1ORCID,Park Yongsu1ORCID

Affiliation:

1. Department of Computer Science, Hanyang University, Wangshimni-ro 222, Seongdong-gu, Seoul 04763, Republic of Korea

Abstract

Dynamic binary instrumentation (DBI) is a technique that enables the monitoring and analysis of software, providing enhanced performance compared to other analysis tools. However, to provide the robust dynamic analysis capabilities, it commonly requires the setup of separate environments for analysis, thereby increasing the contrast with normal execution and the distinctive features that may reveal the presence of the DBI environment. Malware adapts to detect the presence of DBI environments, and it consequently leads to the expansion of the attack surface. In this paper, we provide an in-depth exploration of anti-instrumentation techniques that can be exploited by malware, with a specific focus on the Windows operating system. Leveraging the unique features of the DBI environment, we introduce and categorize DBI detection techniques. Additionally, we conduct a comprehensive analysis of the techniques through the implementation algorithms with bypassing methods for the techniques. Our experiments showcase the effectiveness of these techniques on the latest versions of several DBI frameworks. Furthermore, we address associated concerns with the aim of contributing to the development of enhanced tools to combat malicious activities exploiting DBI and propose directions for future research.

Publisher

MDPI AG

Reference26 articles.

1. Ruth, C. (2023, April 02). Over 95% of All New Malware Threats Discovered in 2022 Are Aimed at Windows. Available online: https://atlasvpn.com/blog/over-95-of-all-new-malware-threats-discovered-in-2022-are-aimed-at-windows.

2. Chen, X., Andersen, J., Mao, Z.M., Bailey, M., and Nazario, J. (2008, January 24–27). Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. Proceedings of the 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN), Anchorage, AK, USA.

3. Scientific but Not Academical Overview of Malware Anti-Debugging, Anti-Disassembly and Anti-VM Technologies;Branco;Black Hat,2012

4. Bypassing Anti-Analysis of Commercial Protector Methods Using DBI Tools;Lee;IEEE Access,2021

5. Valgrind: A Framework for Heavyweight Dynamic Binary Instrumentation;Nicholas;ACM SIGPLAN Notices,2007

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3