SlideShare uma empresa Scribd logo
1 de 25
1
Malwise—An Effective and Efficient
Classification System for Packed and
Polymorphic Malware
GUIDED BY,
Mrs.ASHITHA.S.S
Asst.Professor
IT Department
LMCST
PRESENTED BY,
FEBIN JOY KAVIYIL
S7 CS
LMCST
febinjoykaviyil@gmail.com
• Significant threat
• Prominent in last few years
• Malware detection – a field with
challenging research opportunities
• Anti-Malware systems
• right from the beginning
• rapid advancement
Introduction
3
• Initial techniques involved the use
of controlled environments
• Next or current phase involves the
use of malware databases
Introduction
4
• Predominant technique to detect
malware instance is using malware
signatures
• Database comprises of identified
signatures
• Efficient but not effective against
malware variants
• Malwise proposes a new technique for
signature generation
Introduction
5
• Database creation
oChallenging
oNeeds access to set of known malware
oNeeds constant updating
• Packing
oAdditional code packing to hinder analysis
o86% malwares are packed
• Signature generation
• Classification
oBy comparing signatures
Introduction
6
• Database creation
oFlow graph based signatures are
stored
• Unpacking
o Using entropy analysis
• Signature generation
oControl flow graph based
• Classification
oUsing string edit distances
Introduction
7
Basic block diagram
8
• Using entropy analysis
• Entropy is the amount of information
contained in a block
• Entropy of a block is given by
• Compressed and encrypted data have
high entropy
• In earlier systems controlled emulators
where used to find OEPs-Original Entry
Point
• This was efficient but ineffective
UNPACKING
9
• In malwise the concept is extended
by checking entropy from time to
time
• If entropy of the analyzed data is low
we can assume that no more
encrypted or compressed data is
present and hence stop unpacking
Unpacking
SAMPLE
ENTROPY
HIGH ?
UNPACK
FINISH
UNPACKING
NO
YES
10
UnpackingSAMPLE
ENTROPY
HIGH ? UNPACK
FINISH
UNPACKING
NO
YES
11
• Using Speculative DE-assembly
• Procedures are identified
• Incorrectly identified procedures
are eliminated
• Intermediate representation is
formed
• Weights are assigned with each
signature
De assembly
Intermediate
representation
Control flow
graph
Signature
12
Exact Flow graph matching
• Only exact replicas or isomorphisms are
identified
• Signatures are created by ordering the
nodes of the control flow graph in depth
first order
• Signature will consist of a list of graph
edges for ordered nodes
• Efficient
• Matching done using dictionary lookup
• Weight is found by
Now signatures can be generated for the two flowgraph matching methods available..
Bi-No of basic blocks in binary
Depth first ordered flowgraph and its signature
Signature generation
13
Approximate Flowgraph matching
• Approximate matches of
control flow graph are
considered
• Enables detection of
Variants
• Structuring is used to
generate signatures
• The output will be a string
character tokens
representing high level
structured constructs
• Weight is found by
Control flowgraph->High level structured graph->SIGNATURE
Si - Signature of S in binary
Signature generation
14
Now to obtain the final signature the obtained string is converted to binary
Signature generation
15
• Done using Set similarity
• Database will be comprised of signatures of
known malware
• The input will be a binary
• A similarity is constructed between the
binary’s flowgraph strings and each set of
flowgraphs associated with malwares in the
database
• Complex mechanism
• Considers the weights associated with the
signatures as well
New sample
Non malicious Malicious
16
Basic principle for classification
• The process results with a
similarity value for each set of
signatures in the malware
• Value ranges between 0 and 1
• Value > 0.95 => Isomorphs
• Value < 0.6 => No similarity
• 0.6 > Value < 0.95 => Variant
• The threshold values were
fixed after a thorough pilot
study
Classification
SAMPLE DATABASE
SIMLARITY CHECK
> 0.95
ISOMORPHIC
> 0.6 VARIANT
NON MALICIOUS
17
Classification
SAMPLE DATABASE
SIMLARITY CHECK
SIMILARITY
> 0.95
EXACT MATCH OF
EXISTING
MALWARE
VARIANT
NON MALICIOUS
SIMILARITY
> 0.6
YES
YES
NO
NO
18
OEP
• More efficient and effective than any incorporated technique
• The table shows Malwise’s performance with some common
softwares
19
Classification
• Detection rate was rounded to be about 57.8%
• Earlier approaches achieved maximum up to 39.6
• Resilience to false positives
• Less than 0.61% of the samples were incorrectly
identified as malwares
• At least 10 procedures should be present in the
flowgraph for performing approximate flowgraph
matching.
• For exact flowgraph matching at least 15 procedures
should be present
Evaluation
20
ISSUE EARLIER APPROACH MALWISE
UNPACKING USING CONTROLLED
ENVIRONMENTS
USING ENTROPY ANALYSIS
SIGNATURE
GENERATION
BASED ON BYTE LEVEL
REPRESENTARION
BASED ON CONTROL FLOW
GRAPH
DATABASE SOURCE CODE DEPENDENT
SIGNATURES
CONTROL FLOW DEPENDENT
SIGNATURES
CLASSIFICAION EXACT MATCHING ONLY EXACT MATCHING AND
APPROXIMATE MATCHING
21
• Malwares and malware variants can be identified using similarity in
Control flow graph
• Unpacking using Entropy analysis proved more efficient
• MALWISE proves to be a more efficient and effective substitute for
the existing anti-malware systems in internet gateways or so called
anti-viruses on our desktops
• Not yet implemented as anti-malware system
• However SIMSEER(http://www.simseer.com) and
BUGWISE(http://www.bugwise.com) uses the same technique
22
23
• Malwise—An Effective and
Efficient Classification System for
Packed and Polymorphic
Malware(IEEE PRESENTATION)
• http://www.experthacker.com
• http://www.bugwise.com
• http://www.simseer.com
• http://www.gensign.com/flowgr
aph_malwise
SILVIO CESARE
24
25

Mais conteúdo relacionado

Semelhante a MALWISE

VxClass for Incident Response
VxClass for Incident ResponseVxClass for Incident Response
VxClass for Incident Response
zynamics GmbH
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1
Chong-Kuan Chen
 
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
Kevin Fealey
 

Semelhante a MALWISE (20)

Towards Detecting Performance Anti-patterns Using Classification Techniques
Towards Detecting Performance Anti-patterns Using Classification TechniquesTowards Detecting Performance Anti-patterns Using Classification Techniques
Towards Detecting Performance Anti-patterns Using Classification Techniques
 
ACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
ACSAC2016: Code Obfuscation Against Symbolic Execution AttacksACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
ACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
 
Classification of URLs
Classification of URLsClassification of URLs
Classification of URLs
 
Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using ML
 
Dynamic Testing
Dynamic TestingDynamic Testing
Dynamic Testing
 
VxClass for Incident Response
VxClass for Incident ResponseVxClass for Incident Response
VxClass for Incident Response
 
Introduction to White box testing
Introduction to White box testingIntroduction to White box testing
Introduction to White box testing
 
Using Rank Aggregation in Continuously Answering SPARQL Queries on Streaming ...
Using Rank Aggregation in Continuously Answering SPARQL Queries on Streaming ...Using Rank Aggregation in Continuously Answering SPARQL Queries on Streaming ...
Using Rank Aggregation in Continuously Answering SPARQL Queries on Streaming ...
 
Interpreting Performance Test Results
Interpreting Performance Test ResultsInterpreting Performance Test Results
Interpreting Performance Test Results
 
Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?Is your SAP system vulnerable to cyber attacks?
Is your SAP system vulnerable to cyber attacks?
 
DEF CON 27 - CHRISTOPHER ROBERTS - firmware slap
DEF CON 27 - CHRISTOPHER ROBERTS - firmware slapDEF CON 27 - CHRISTOPHER ROBERTS - firmware slap
DEF CON 27 - CHRISTOPHER ROBERTS - firmware slap
 
2012 S&P Paper Reading Session1
2012 S&P Paper Reading Session12012 S&P Paper Reading Session1
2012 S&P Paper Reading Session1
 
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malwa...
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malwa...A Fast Flowgraph Based Classification System for Packed and Polymorphic Malwa...
A Fast Flowgraph Based Classification System for Packed and Polymorphic Malwa...
 
Inbot10 vxclass
Inbot10 vxclassInbot10 vxclass
Inbot10 vxclass
 
Grant Fritchey Justin Caldicott - Best practices for database deployments
Grant Fritchey Justin Caldicott - Best practices for database deploymentsGrant Fritchey Justin Caldicott - Best practices for database deployments
Grant Fritchey Justin Caldicott - Best practices for database deployments
 
Best Practices for Database Deployments
Best Practices for Database DeploymentsBest Practices for Database Deployments
Best Practices for Database Deployments
 
Test case techniques
Test case techniquesTest case techniques
Test case techniques
 
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...What Good is this Tool? A Guide to Choosing the Right Application Security Te...
What Good is this Tool? A Guide to Choosing the Right Application Security Te...
 
A Software Testing Intro
A Software Testing IntroA Software Testing Intro
A Software Testing Intro
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
 

Último

Hosa Road Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ban...
Hosa Road Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ban...Hosa Road Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ban...
Hosa Road Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ban...
amitlee9823
 
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
amitlee9823
 
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
motiram463
 
Just Call Vip call girls Bhiwandi Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Bhiwandi Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls Bhiwandi Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Bhiwandi Escorts ☎️9352988975 Two shot with one girl...
gajnagarg
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
amitlee9823
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
gajnagarg
 
Just Call Vip call girls chhindwara Escorts ☎️9352988975 Two shot with one gi...
Just Call Vip call girls chhindwara Escorts ☎️9352988975 Two shot with one gi...Just Call Vip call girls chhindwara Escorts ☎️9352988975 Two shot with one gi...
Just Call Vip call girls chhindwara Escorts ☎️9352988975 Two shot with one gi...
gajnagarg
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
tufbav
 
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
tufbav
 
➥🔝 7737669865 🔝▻ Vijayawada Call-girls in Women Seeking Men 🔝Vijayawada🔝 E...
➥🔝 7737669865 🔝▻ Vijayawada Call-girls in Women Seeking Men  🔝Vijayawada🔝   E...➥🔝 7737669865 🔝▻ Vijayawada Call-girls in Women Seeking Men  🔝Vijayawada🔝   E...
➥🔝 7737669865 🔝▻ Vijayawada Call-girls in Women Seeking Men 🔝Vijayawada🔝 E...
amitlee9823
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Último (20)

(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
 
Hosa Road Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ban...
Hosa Road Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ban...Hosa Road Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ban...
Hosa Road Call Girls Service: ☎ 7737669865 ☎ High Profile Model Escorts | Ban...
 
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men  🔝Deoghar🔝   Escorts...
➥🔝 7737669865 🔝▻ Deoghar Call-girls in Women Seeking Men 🔝Deoghar🔝 Escorts...
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratory
 
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Bommasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
 
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
(👉Ridhima)👉VIP Model Call Girls Mulund ( Mumbai) Call ON 9967824496 Starting ...
 
Just Call Vip call girls Bhiwandi Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Bhiwandi Escorts ☎️9352988975 Two shot with one girl...Just Call Vip call girls Bhiwandi Escorts ☎️9352988975 Two shot with one girl...
Just Call Vip call girls Bhiwandi Escorts ☎️9352988975 Two shot with one girl...
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
Just Call Vip call girls godhra Escorts ☎️9352988975 Two shot with one girl (...
 
Just Call Vip call girls chhindwara Escorts ☎️9352988975 Two shot with one gi...
Just Call Vip call girls chhindwara Escorts ☎️9352988975 Two shot with one gi...Just Call Vip call girls chhindwara Escorts ☎️9352988975 Two shot with one gi...
Just Call Vip call girls chhindwara Escorts ☎️9352988975 Two shot with one gi...
 
Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
 
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
➥🔝 7737669865 🔝▻ Vijayawada Call-girls in Women Seeking Men 🔝Vijayawada🔝 E...
➥🔝 7737669865 🔝▻ Vijayawada Call-girls in Women Seeking Men  🔝Vijayawada🔝   E...➥🔝 7737669865 🔝▻ Vijayawada Call-girls in Women Seeking Men  🔝Vijayawada🔝   E...
➥🔝 7737669865 🔝▻ Vijayawada Call-girls in Women Seeking Men 🔝Vijayawada🔝 E...
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
 

MALWISE

  • 1. 1
  • 2. Malwise—An Effective and Efficient Classification System for Packed and Polymorphic Malware GUIDED BY, Mrs.ASHITHA.S.S Asst.Professor IT Department LMCST PRESENTED BY, FEBIN JOY KAVIYIL S7 CS LMCST febinjoykaviyil@gmail.com
  • 3. • Significant threat • Prominent in last few years • Malware detection – a field with challenging research opportunities • Anti-Malware systems • right from the beginning • rapid advancement Introduction 3
  • 4. • Initial techniques involved the use of controlled environments • Next or current phase involves the use of malware databases Introduction 4
  • 5. • Predominant technique to detect malware instance is using malware signatures • Database comprises of identified signatures • Efficient but not effective against malware variants • Malwise proposes a new technique for signature generation Introduction 5
  • 6. • Database creation oChallenging oNeeds access to set of known malware oNeeds constant updating • Packing oAdditional code packing to hinder analysis o86% malwares are packed • Signature generation • Classification oBy comparing signatures Introduction 6
  • 7. • Database creation oFlow graph based signatures are stored • Unpacking o Using entropy analysis • Signature generation oControl flow graph based • Classification oUsing string edit distances Introduction 7
  • 9. • Using entropy analysis • Entropy is the amount of information contained in a block • Entropy of a block is given by • Compressed and encrypted data have high entropy • In earlier systems controlled emulators where used to find OEPs-Original Entry Point • This was efficient but ineffective UNPACKING 9
  • 10. • In malwise the concept is extended by checking entropy from time to time • If entropy of the analyzed data is low we can assume that no more encrypted or compressed data is present and hence stop unpacking Unpacking SAMPLE ENTROPY HIGH ? UNPACK FINISH UNPACKING NO YES 10
  • 12. • Using Speculative DE-assembly • Procedures are identified • Incorrectly identified procedures are eliminated • Intermediate representation is formed • Weights are assigned with each signature De assembly Intermediate representation Control flow graph Signature 12
  • 13. Exact Flow graph matching • Only exact replicas or isomorphisms are identified • Signatures are created by ordering the nodes of the control flow graph in depth first order • Signature will consist of a list of graph edges for ordered nodes • Efficient • Matching done using dictionary lookup • Weight is found by Now signatures can be generated for the two flowgraph matching methods available.. Bi-No of basic blocks in binary Depth first ordered flowgraph and its signature Signature generation 13
  • 14. Approximate Flowgraph matching • Approximate matches of control flow graph are considered • Enables detection of Variants • Structuring is used to generate signatures • The output will be a string character tokens representing high level structured constructs • Weight is found by Control flowgraph->High level structured graph->SIGNATURE Si - Signature of S in binary Signature generation 14
  • 15. Now to obtain the final signature the obtained string is converted to binary Signature generation 15
  • 16. • Done using Set similarity • Database will be comprised of signatures of known malware • The input will be a binary • A similarity is constructed between the binary’s flowgraph strings and each set of flowgraphs associated with malwares in the database • Complex mechanism • Considers the weights associated with the signatures as well New sample Non malicious Malicious 16
  • 17. Basic principle for classification • The process results with a similarity value for each set of signatures in the malware • Value ranges between 0 and 1 • Value > 0.95 => Isomorphs • Value < 0.6 => No similarity • 0.6 > Value < 0.95 => Variant • The threshold values were fixed after a thorough pilot study Classification SAMPLE DATABASE SIMLARITY CHECK > 0.95 ISOMORPHIC > 0.6 VARIANT NON MALICIOUS 17
  • 18. Classification SAMPLE DATABASE SIMLARITY CHECK SIMILARITY > 0.95 EXACT MATCH OF EXISTING MALWARE VARIANT NON MALICIOUS SIMILARITY > 0.6 YES YES NO NO 18
  • 19. OEP • More efficient and effective than any incorporated technique • The table shows Malwise’s performance with some common softwares 19
  • 20. Classification • Detection rate was rounded to be about 57.8% • Earlier approaches achieved maximum up to 39.6 • Resilience to false positives • Less than 0.61% of the samples were incorrectly identified as malwares • At least 10 procedures should be present in the flowgraph for performing approximate flowgraph matching. • For exact flowgraph matching at least 15 procedures should be present Evaluation 20
  • 21. ISSUE EARLIER APPROACH MALWISE UNPACKING USING CONTROLLED ENVIRONMENTS USING ENTROPY ANALYSIS SIGNATURE GENERATION BASED ON BYTE LEVEL REPRESENTARION BASED ON CONTROL FLOW GRAPH DATABASE SOURCE CODE DEPENDENT SIGNATURES CONTROL FLOW DEPENDENT SIGNATURES CLASSIFICAION EXACT MATCHING ONLY EXACT MATCHING AND APPROXIMATE MATCHING 21
  • 22. • Malwares and malware variants can be identified using similarity in Control flow graph • Unpacking using Entropy analysis proved more efficient • MALWISE proves to be a more efficient and effective substitute for the existing anti-malware systems in internet gateways or so called anti-viruses on our desktops • Not yet implemented as anti-malware system • However SIMSEER(http://www.simseer.com) and BUGWISE(http://www.bugwise.com) uses the same technique 22
  • 23. 23
  • 24. • Malwise—An Effective and Efficient Classification System for Packed and Polymorphic Malware(IEEE PRESENTATION) • http://www.experthacker.com • http://www.bugwise.com • http://www.simseer.com • http://www.gensign.com/flowgr aph_malwise SILVIO CESARE 24
  • 25. 25

Notas do Editor

  1. New malware detection method Could be asubstitute fo existing systems
  2. Studies show that in the years 2007-13 twice as much malware as in the past 20 years have been detected Hackers are more enthusiastic and keep coming up with new ways to harm our systems
  3. Signature-invariant characters or patterns which that uniquely identifies a program . It is formed from the byte level representation. Variant – those malwares created by slight editing in the source code.The source code and working may be similar but the byte level representation will be entirely different
  4. where p(i) is the probability of the ith unit of information in event x’s sequence of N symbols
  5. STRUCTURING IS THE PROCESS OF RECOVERING HIGH LEVEL STRUCTURED CONTROL FLOW FROM A CONTROL FLOW GRAPH
  6. Failure in pepsin was due to unused encrypted data left in the process image