earticle

논문검색

Efficient Methods to Trigger Adversarial Behaviors from Malware during Virtual Execution in SandBox

초록

영어

Recently, various organizations are confronting a grater attack surface, the growing proliferation of malware and the number of malicious codes has been consistently growing for several years. To respond actively against these malicious codes, analysts employ automated investigation tools on the malware. However, there has been advent of malware employing the various techniques to avoid the detection of the SandBox, which makes hard to identify the adversarial behaviors of the samples codes. In this paper, we propose efficient methods to trigger adversarial behaviors from the sample codes during virtual execution in the Sandbox in order to perform the analysis of malware.

목차

Abstract
 1. Introduction
 2. Related Works
  2.1. Malware Analysis Techniques
  2.2. Malware Analysis Techniques based on Virtual Machines
  2.3. Malware Analysis Tools
 3. Techniques Preventing Malware Detection
  3.1. Limitations on Malware Analysis
  3.2. Detouring Techniques against Sandbox Malware Detection
 4. Methods to Trigger the Malicious Activities
  4.1. Fuzzing based Triggering Technique
  4.2. User Action Events based Triggering Technique
 5. Conclusion
 Acknowledgements
 References

저자정보

  • Jung-Uk Joo Interdisciplinary Program of Information & Protection, Mokpo National University
  • Incheol Shin Dept. of Information Security Engineering, Mokpo National University
  • Minsoo Kim Dept. of Information Security Engineering, Mokpo National University

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.