论文标题
关于二元仿真在恶意软件分类中的有效性
On the Effectiveness of Binary Emulation in Malware Classification
论文作者
论文摘要
恶意软件作者正在不断发展其代码库,以包括可能会大大阻碍其检测和阻塞的反分析方法。虽然在沙盒环境中执行恶意软件可能会提供有关恶意软件在机器中的实际作用的大量有见地的反馈,但反虚拟化和钩望逃避方法可能会允许恶意软件绕过这种检测方法。这项工作的主要目的是通过使用二进制模拟框架来补充沙箱执行。核心想法是利用这样一个事实,即二进制仿真框架可能比沙盒环境更快地测试样品,因为它们不需要打开全新的虚拟机即可执行二进制。尽管采用这种方法,但由于可伸缩性问题,我们会失去可以通过沙箱收集的数据的粒度,因此可能需要简单地确定文件是恶意的还是它属于的恶意软件家族。为此,我们记录执行的API调用,并使用它们来探索将其用作二进制和多类分类功能的功效。我们对现实世界恶意软件进行的广泛实验表明,这种方法非常准确,通过统计坚固的分类实验集实现了最先进的结果,同时与传统的沙盒方法相比,计算开销相对较低。实际上,我们将二进制分析结果与商业沙箱进行了比较,而我们的分类以牺牲沙盒提供的细粒结果为代价优于它。
Malware authors are continuously evolving their code base to include counter-analysis methods that can significantly hinder their detection and blocking. While the execution of malware in a sandboxed environment may provide a lot of insightful feedback about what the malware actually does in a machine, anti-virtualisation and hooking evasion methods may allow malware to bypass such detection methods. The main objective of this work is to complement sandbox execution with the use of binary emulation frameworks. The core idea is to exploit the fact that binary emulation frameworks may quickly test samples quicker than a sandbox environment as they do not need to open a whole new virtual machine to execute the binary. While with this approach, we lose the granularity of the data that can be collected through a sandbox, due to scalability issues, one may need to simply determine whether a file is malicious or to which malware family it belongs. To this end, we record the API calls that are performed and use them to explore the efficacy of using them as features for binary and multiclass classification. Our extensive experiments with real-world malware illustrate that this approach is very accurate, achieving state-of-the art outcomes with a statistically robust set of classification experiments while simultaneously having a relatively low computational overhead compared to traditional sandbox approaches. In fact, we compare the binary analysis results with a commercial sandbox, and our classification outperforms it at the expense of the fine-grained results that a sandbox provides.