Frankenstein: Stitching Malware from Benign Binaries.

WOOT'12: Proceedings of the 6th USENIX conference on Offensive Technologies(2012)

引用 14|浏览32
暂无评分
摘要
This paper proposes a new self-camouflaging malware propagation system, Frankenstein, that overcomes shortcomings in the current generation of metamorphic malware. Specifically, although mutants produced by current state-of-the-art metamorphic engines are diverse, they still contain many characteristic binary features that reliably distinguish them from benign software. Frankenstein forgoes the concept of a metamorphic engine and instead creates mutants by stitching together instructions from non-malicious programs that have been classified as benign by local defenses. This makes it more difficult for feature-based malware detectors to reliably use those byte sequences as a signature to detect the malware. The instruction sequence harvesting process leverages recent advances in gadget discovery for return-oriented programming. Preliminary tests show that mining just a few local programs is sufficient to provide enough gadgets to implement arbitrary functionality.
更多
查看译文
关键词
feature-based malware detector,metamorphic malware,new self-camouflaging malware propagation,current state-of-the-art metamorphic engine,metamorphic engine,benign software,current generation,local defenses,local program,arbitrary functionality,benign binary,stitching malware
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要