Abstract
A security sandbox is a technology that is often used to detect advanced malware. However, current sandboxes are highly dependent on VM hypervisor types and versions. Thus, in this paper, we introduce a new sandbox design, using memory forensics techniques, to provide an agentless sandbox solution that is independent of the VM hypervisor. In particular, we leverage the VM introspection method to monitor malware running memory data outside the VM and analyze its system behaviors, such as process, file, registry, and network activities. We evaluate the feasibility of this method using 20 advanced and 8 script-based malware samples. We furthermore demonstrate how to analyze malware behavior from memory and verify the results with three different sandbox types. The results show that we can analyze suspicious malware activities, which is also helpful for cyber security defense.
Original language | English |
---|---|
Title of host publication | 2017 IEEE Conference on Dependable and Secure Computing |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 518-519 |
Number of pages | 2 |
ISBN (Electronic) | 9781509055692 |
DOIs | |
State | Published - 18 10 2017 |
Externally published | Yes |
Event | 2017 IEEE Conference on Dependable and Secure Computing - Taipei, Taiwan Duration: 07 08 2017 → 10 08 2017 |
Publication series
Name | 2017 IEEE Conference on Dependable and Secure Computing |
---|
Conference
Conference | 2017 IEEE Conference on Dependable and Secure Computing |
---|---|
Country/Territory | Taiwan |
City | Taipei |
Period | 07/08/17 → 10/08/17 |
Bibliographical note
Publisher Copyright:© 2017 IEEE.
Keywords
- Advanced malware analysis
- Cyber security
- Security sandbox
- Virtual machine introspection