Design issues of an isolated sandbox used to analyze malwares
Advances in Information and Computer Security: Second International Workshop …, 2007•Springer
Recent viruses, worms, and bots, called malwares, often have anti-analysis functions such
as mechanisms that confirm connectivity to certain Internet hosts and detect virtualized
environments. We discuss how malwares can be kept alive in an analyzing environment by
disabling their anti-analyzing mechanisms. To avoid any impacts to/from the Internet, we
conclude that analyzing environments should be disconnected from the Internet but must be
able to make malwares believe that they are connected to the real Internet. We also …
as mechanisms that confirm connectivity to certain Internet hosts and detect virtualized
environments. We discuss how malwares can be kept alive in an analyzing environment by
disabling their anti-analyzing mechanisms. To avoid any impacts to/from the Internet, we
conclude that analyzing environments should be disconnected from the Internet but must be
able to make malwares believe that they are connected to the real Internet. We also …
Abstract
Recent viruses, worms, and bots, called malwares, often have anti-analysis functions such as mechanisms that confirm connectivity to certain Internet hosts and detect virtualized environments. We discuss how malwares can be kept alive in an analyzing environment by disabling their anti-analyzing mechanisms. To avoid any impacts to/from the Internet, we conclude that analyzing environments should be disconnected from the Internet but must be able to make malwares believe that they are connected to the real Internet. We also conclude that, for executing environments to analyze anti-virtualization malwares, they should not be virtualized but must be as easily reconstructable as a virtualized environment. To reconcile these cross-purposes, we propose an approach that consists of a mimetic Internet and a malware incubator with swappable actual nodes. We implemented a prototype system and conducted an experiment to test the adequacy of our approach.
Springer
Showing the best result for this search. See all results