Poster: Obfuscation Revealed - Using Electromagnetic Emanation to Identify and Classify Malware<bold> </bold>

被引:1
作者
Duy-Phuc Pham [1 ]
Marion, Damien [1 ]
Heuser, Annelie [1 ]
机构
[1] Univ Rennes, CNRS, IRISA, Rennes, France
来源
2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021) | 2021年
关键词
malware; classification; obfuscation; EM; side-channel<bold>; </bold>;
D O I
10.1109/EuroSP51992.2021.00055
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this poster we present a novel approach of using side channel information to identify the kinds of malware threats that are targeting IoT devices. Although in the presence of obfuscation techniques that can prevent static or symbolic binary analysis, a malware researcher may obtain detailed information about malware type and identification using our method by leveraging side channel by electromagnetism rather than software-layer malware analysis. By capturing 100,000 measurement traces from an IoT system infected with different malware samples, we can obtain this information without altering the actual hardware. As a result, it can be implemented without any overhead, regardless of the resources available. Furthermore, our method has the advantage of non-trivial for malware authors to avoid. We were able to distinguish malware families based on side-channel knowledge without being able to see what exact hardware was involved. We were able to predict three generic malware forms (and one benign class) with a 99.89% percent accuracy in our tests. Furthermore, our results show that we are able to classify altered malware samples with unseen obfuscation techniques during the training phase, and to determine what kind of obfuscations, which makes our approach particularly useful for malware analysts.<bold> </bold>
引用
收藏
页码:710 / 712
页数:3
相关论文
共 7 条
  • [1] Collberg Christian, The Tigress C Diversifier/Obfuscator
  • [2] Obfuscator-LLVM - Software Protection for the Masses
    Junod, Pascal
    Rinaldini, Julien
    Wehrli, Johan
    Michielin, Julie
    [J]. 2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SOFTWARE PROTECTION (SPRO), 2015, : 3 - 9
  • [3] Katzenbeisser Stefan, 2011, MALWARE DETECTION, P752
  • [4] Khan H.A., 2019, J. Hardw. Syst. Secur., V3, P305, DOI [10.1007/s41635-019-00074-w, DOI 10.1007/S41635-019-00074-W]
  • [5] Detailed Tracking of Program Control Flow Using Analog Side-Channel Signals: A Promise for IoT Malware Detection and a Threat for Many Cryptographic Implementations
    Khan, Haider Adnan
    Alam, Monjur
    Zajic, Alenka
    Prvulovic, Milos
    [J]. CYBER SENSING 2018, 2018, 10630
  • [6] Markus F.X.J., UPX ULTIMATE PACKER
  • [7] Deep learning-based classification and anomaly detection of side-channel signals
    Wang, Xiao
    Zhou, Quan
    Harer, Jacob
    Brown, Gavin
    Qiu, Shangran
    Dou, Zhi
    Wang, John
    Hinton, Alan
    Gonzalez, Carlos Aguayo
    Chin, Peter
    [J]. CYBER SENSING 2018, 2018, 10630