Handling Anti-Virtual Machine Techniques in Malicious Software

被引:20
作者
Shi, Hao [1 ]
Mirkovic, Jelena [1 ]
Alwabel, Abdulla [1 ]
机构
[1] USC, Inst Informat Sci, 4676 Admiralty Way,Ste 1001, Marina Del Rey, CA 90292 USA
关键词
Words and Phrases: System security; virtual machine testing; reverse engineering; assembly;
D O I
10.1145/3139292
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware analysis relies heavily on the use of virtual machines (VMs) for functionality and safety. There are subtle differences in operation between virtual and physical machines. Contemporary malware checks for these differences and changes its behavior when it detects a VM presence. These anti-VM techniques hinder malware analysis. Existing research approaches to uncover differences between VMs and physical machines use randomized testing, and thus cannot guarantee completeness. In this article, we propose a detect-and-hide approach, which systematically addresses anti-VM techniques in malware. First, we propose cardinal pill testing-a modification of red pill testing that aims to enumerate the differences between a given VMand a physical machine through carefully designed tests. Cardinal pill testing finds five times more pills by running 15 times fewer tests than red pill testing. We examine the causes of pills and find that, while the majority of them stem from the failure of VMs to follow CPU specifications, a small number stem from under-specification of certain instructions by the Intel manual. This leads to divergent implementations in different CPU and VM architectures. Cardinal pill testing successfully enumerates the differences that stem from the first cause. Finally, we propose VM Cloak-a WinDbg plug-in which hides the presence of VMs from malware. VM Cloak monitors each execute malware command, detects potential pills, and at runtime modifies the command's outcomes to match those that a physical machine would generate. We implemented VM Cloak and verified that it successfully hides VM presence from malware.
引用
收藏
页数:31
相关论文
共 39 条
[1]  
[Anonymous], 2016, INT 64 IA 32 ARCH SO
[2]  
[Anonymous], 2012, Practical malware analysis: the hands-on guide to dissecting malicious software
[3]   Cyber defense technology networking and evaluation [J].
Bajcsy, R ;
Benzel, T ;
Bishop, M ;
Braden, B ;
Brodley, C ;
Fahmy, S ;
Floyd, S ;
Hardaker, W ;
Joseph, A ;
Kesidis, G ;
Levitt, K ;
Lindell, B ;
Liu, P ;
Miller, D ;
Mundy, R ;
Neuman, C ;
Ostrenga, R ;
Paxson, V ;
Porras, P ;
Rosenberg, C ;
Tygar, JD ;
Sastry, S ;
Sterne, D ;
Wu, SF .
COMMUNICATIONS OF THE ACM, 2004, 47 (03) :58-61
[4]  
Balzarotti Davide, 2010, NETW DISTR SYST S ND, P20
[5]  
Barford Paul, 2007, HOTBOTS, P1
[6]  
Basis Technology, 2016, THE SLEUTH KIT
[7]  
Bayer Ulrich, 2006, 14 ANN EICAR C
[8]  
BELLARD F, 2005, USENIX ANN TECHN C A
[9]  
Branco RodrigoRubira., 2012, BLACK HAT, DOI DOI 10.1088/1751-8113/44/8/085201
[10]  
Chen X., 2008, DSN