원문정보
초록
영어
Recently, various organizations are confronting a grater attack surface, the growing proliferation of malware and the number of malicious codes has been consistently growing for several years. To respond actively against these malicious codes, analysts employ automated investigation tools on the malware. However, there has been advent of malware employing the various techniques to avoid the detection of the SandBox, which makes hard to identify the adversarial behaviors of the samples codes. In this paper, we propose efficient methods to trigger adversarial behaviors from the sample codes during virtual execution in the Sandbox in order to perform the analysis of malware.
목차
1. Introduction
2. Related Works
2.1. Malware Analysis Techniques
2.2. Malware Analysis Techniques based on Virtual Machines
2.3. Malware Analysis Tools
3. Techniques Preventing Malware Detection
3.1. Limitations on Malware Analysis
3.2. Detouring Techniques against Sandbox Malware Detection
4. Methods to Trigger the Malicious Activities
4.1. Fuzzing based Triggering Technique
4.2. User Action Events based Triggering Technique
5. Conclusion
Acknowledgements
References