An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis

被引:0
|
作者
Anastasia Pereberina
Alexey Kostyushko
Alexander Tormasov
机构
[1] MIPT,
[2] Innopolis University,undefined
来源
Journal of Computer Virology and Hacking Techniques | 2023年 / 19卷
关键词
Cybersecurity; Malware; Dynamic malware analysis; Hooks; CPU scheduling;
D O I
暂无
中图分类号
学科分类号
摘要
This paper discusses the development of tools for dynamic malware analysis. The main idea is to provide total control over a suspicious sample execution on the test computer. The approach we propose is to separate the application code from the system code by using memory page access control. Thus, we are able to detect all system API calls and non-standard ways to transfer the control flow. Our tools (codename ToolChain) intentionally consist of a Control module, a Scheduling module, and a Cloaking module. In our previous paper, we focused mainly on the Control module. In this paper, we introduce the Scheduling module. In case of multithreaded applications, we split threads into two pools, executing different code classes. We describe the hierarchical multiprocessor fair scheduling algorithm built upon Windows Round Robin with Priorities. In addition, we consider related cloaking techniques to hide performance degradation and the presence of the Scheduling module.
引用
收藏
页码:459 / 468
页数:9
相关论文
共 50 条
  • [21] Efficient Workflow Scheduling Algorithm for Cloud Computing System: A Dynamic Priority-Based Approach
    Indrajeet Gupta
    Madhu Sudan Kumar
    Prasanta K. Jana
    Arabian Journal for Science and Engineering, 2018, 43 : 7945 - 7960
  • [22] Efficient Workflow Scheduling Algorithm for Cloud Computing System: A Dynamic Priority-Based Approach
    Gupta, Indrajeet
    Kumar, Madhu Sudan
    Jana, Prasanta K.
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (12) : 7945 - 7960
  • [23] Application of System Dynamic Approach for Family Takaful Product Analysis
    Mohamad, A. I.
    Tumin, M. H.
    Noor, N. L. M.
    Saman, F. M.
    Amin, M. N. M.
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2018, 26 (01): : 379 - 389
  • [24] An Approach for Dynamic Scheduling of Data Analysis Algorithms
    Gui, Jun
    Zheng, Zeyu
    Gao, Yuan
    Qin, Zhaobo
    2019 4TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (ICBDA 2019), 2019, : 53 - 57
  • [25] Malware Detection Approach Based on Artifacts in Memory Image and Dynamic Analysis
    Sihwail, Rami
    Omar, Khairuddin
    Ariffin, Khairul Akram Zainol
    Al Afghani, Sanad
    APPLIED SCIENCES-BASEL, 2019, 9 (18):
  • [26] Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
    Darabian, Hamid
    Homayounoot, Sajad
    Dehghantanha, Ali
    Hashemi, Sattar
    Karimipour, Hadis
    Parizi, Reza M.
    Choo, Kim-Kwang Raymond
    JOURNAL OF GRID COMPUTING, 2020, 18 (02) : 293 - 303
  • [27] Research and application of dynamic scheduling system of coil yard
    Zhang, Xuejun
    Lv, Zhimin
    2013 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION (ICIA), 2013, : 1050 - 1055
  • [28] Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
    Hamid Darabian
    Sajad Homayounoot
    Ali Dehghantanha
    Sattar Hashemi
    Hadis Karimipour
    Reza M. Parizi
    Kim-Kwang Raymond Choo
    Journal of Grid Computing, 2020, 18 : 293 - 303
  • [29] Dynamic code assignment algorithm for CDMA with smart antenna system
    Odeh, Nidhal
    Khatun, Sabira
    Ali, Borhanuddin Mohd
    Ismail, Alyani
    ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 160 - +
  • [30] Analysis of Process Scheduling Algorithm for Multiprocessor System
    Suman, Chandresh
    Kumar, Gaurav
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 564 - 569