Talks and Poster Presentations (with Proceedings-Entry):
C. Kolbitsch, E. Kirda, C. Krügel:
"The Power of Procrastination: Detection and Mitigation of Execution-Stalling Malicious Code";
Talk: ACM Conference on Computer and Communications Security (CCS),
- 2011-10-21; in: "Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS)",
Malware continues to remain one of the most important security problems on the Internet today. Whenever an anti-malware solution becomes popular, malware authors typically react promptly and modify their programs to evade defense mechanisms. For ex- ample, recently, malware authors have increasingly started to create malicious code that can evade dynamic analysis.
One recent form of evasion against dynamic analysis systems is stalling code. Stalling code is typically executed before any malicious behavior. The attackerīs aim is to delay the execution of the malicious activity long enough so that an automated dynamic analysis system fails to extract the interesting malicious behavior. This paper presents the first approach to detect and mitigate malicious stalling code, and to ensure forward progress within the amount of time allocated for the analysis of a sample. Experimental results show that our system, called HASTEN, works well in practice, and that it is able to detect additional malicious behavior in real-world malware samples.
Malware Analysis, Evasion, Emulation
Electronic version of the publication:
Project Head Christian Platzer:
A European Network of Excellence in Managing Threats and Vulnerabilities in the Future Internet: Europe for the World
Project Head Gilbert Wondracek:
TRUDIE - Trust Relationships in Underground IT Economies
Created from the Publication Database of the Vienna University of Technology.