A framework for automated dynamic malware analysis for Linux

被引:0
作者
Vurdelja, Igor [1 ]
Blazic, Ivan [1 ]
Bojic, Dragan [1 ]
Draskovic, Drazen [1 ]
机构
[1] Univ Belgrade, Sch Elect Engn, 73 Bulevar Kralja Aleksandra, Belgrade 11020, Serbia
来源
2020 28TH TELECOMMUNICATIONS FORUM (TELFOR) | 2020年
关键词
Computer Security; Dynamic Analysis; Sandbox; Linux;
D O I
10.1109/telfor51502.2020.9306520
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Development of malware protection tools requires a more advanced test environment comparing to safe software. This kind of development includes a safe execution of many malware samples in order to evaluate the protective power of the tool. The host machine needs to be protected from the harmful effects of malware samples and provide a realistic simulation of the execution environment. In this paper, a framework for automated malware analysis on Linux is presented. Different types of malware analysis methods are discussed, as well as the properties of a good framework for dynamic malware analysis.
引用
收藏
页码:379 / 382
页数:4
相关论文
共 9 条
  • [1] Afianian A., ARXIV181101190V1CSCR
  • [2] Korkin I, 2015, ANN C DIG FOR SEC LA, P33
  • [3] Rodrigues B., 2018, P 13 INT C SOFTW TEC, P755
  • [4] Roglia G. F., 2009, USENIX WORKSH OFF TE
  • [5] Handling Anti-Virtual Machine Techniques in Malicious Software
    Shi, Hao
    Mirkovic, Jelena
    Alwabel, Abdulla
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2018, 21 (01)
  • [6] LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis
    Spensky, Chad
    Hu, Hongyi
    Leach, Kevin
    [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [7] Container Security: Issues, Challenge and the Road Ahead
    Sultan, Sari
    Ahmad, Imtiaz
    Dimitriou, Tassos
    [J]. IEEE ACCESS, 2019, 7 : 52976 - 52996
  • [8] Vurdelja I., ICETRAN 2020
  • [9] Yadav A., 2018, P EM TECHN DAT MIN I, VVolume 3, P141