Author:
Botacin Marcus,Rocha Vitor Falcão da,Geus Paulo Lício de,Grégio André
Abstract
Malicious programs are persistent threats to computer systems, and their damages extend from financial losses to critical infrastructure attacks. Malware analysis aims to provide useful information to be used for forensic procedures and countermeasures development. To thwart that, attackers make use of anti-analysis techniques that prevent or difficult their malware from being analyzed. These techniques rely on instruction side-effects and that system's structure checks are inspection-aware. Thus, detecting evasion attempts is an important step of any successful investigative procedure. In this paper, we present a broad overview of what anti-analysis techniques are being used in malware and how they work, as well as their detection counterparts, i.e., the anti-anti-analysis techniques that may be used by forensic investigators to defeat evasive malware. We also evaluated over one hundred thousand samples in the search of the presence of anti-analysis technique and summarized the obtained information to present an evasion-aware malware threat scenario.
Publisher
Sociedade Brasileira de Computação - SBC
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Framework for understanding intention-unbreakable malware;Science China Information Sciences;2023-03-27
2. Terminator
: A Secure Coprocessor to Accelerate Real-Time AntiViruses Using Inspection Breakpoints;ACM Transactions on Privacy and Security;2022-03-04
3. Hardware-Assisted Malware Analysis;Anais Estendidos do XVIII Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg Estendido 2018);2018-10-25