Malware MultiVerse: From Automatic Logic Bomb Identification to Automatic Patching and Tracing

09/13/2021
by   Marcus Botacin, et al.
0

Malware and other suspicious software often hide behaviors and components behind logic bombs and context-sensitive execution paths. Uncovering these is essential to react against modern threats, but current solutions are not ready to detect these paths in a completely automated manner. To bridge this gap, we propose the Malware Multiverse (MalVerse), a solution able to inspect multiple execution paths via symbolic execution aiming to discover function inputs and returns that trigger malicious behaviors. MalVerse automatically patches the context-sensitive functions with the identified symbolic values to allow the software execution in a traditional sandbox. We implemented MalVerse on top of angr and evaluated it with a set of Linux and Windows evasive samples. We found that MalVerse was able to generate automatic patches for the most common evasion techniques (e.g., ptrace checks).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/27/2019

TASE: Reducing latency of symbolic execution with transactional memory

We present the design and implementation of a tool called TASE that uses...
research
12/16/2017

Enhancing Symbolic Execution of Heap-based Programs with Separation Logic for Test Input Generation

Symbolic execution is a well established method for test input generatio...
research
07/29/2023

Vulnerability Detection Approaches on Application Behaviors in Mobile Environment

Several solutions ensuring the dynamic detection of malicious activities...
research
03/30/2021

Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents

Many malware campaigns use Microsoft (MS) Office documents as droppers t...
research
12/17/2013

Mining Malware Specifications through Static Reachability Analysis

The number of malicious software (malware) is growing out of control. Sy...
research
08/24/2019

Precise system-wide concatic malware unpacking

Run time packing is a common approach malware use to obfuscate their pay...
research
05/14/2020

DjangoChecker: Applying Extended Taint Tracking and Server Side Parsing for Detection of Context-Sensitive XSS Flaws

Cross-site scripting (XSS) flaws are a class of security flaws that perm...

Please sign up or login with your details

Forgot password? Click here to reset