Preview

Ddasdsdsd Sd Sd Sad Dads Sd D

Powerful Essays
Open Document
Open Document
8999 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ddasdsdsd Sd Sd Sad Dads Sd D
J Comput Virol (2006) 2:67–77
DOI 10.1007/s11416-006-0012-2

ORIGINAL PAPER

Dynamic analysis of malicious code
Ulrich Bayer · Andreas Moser ·
Christopher Kruegel · Engin Kirda

Received: 13 January 2006 / Accepted: 27 March 2006 / Published online: 16 May 2006
© Springer-Verlag France 2006

Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be able to develop effective detection techniques for malicious code. In addition, it is an important prerequisite for the development of removal tools that can thoroughly delete malware from an infected machine. Traditionally, malware analysis has been a manual process that is tedious and timeintensive. Unfortunately, the number of samples that need to be analyzed by security vendors on a daily basis is constantly increasing. This clearly reveals the need for tools that automate and simplify parts of the analysis process. In this paper, we present TTAnalyze, a tool for dynamically analyzing the behavior of Windows executables. To this end, the binary is run in an emulated operating system environment and its
(security-relevant) actions are monitored. In particular, we record the Windows native system calls and Windows API functions that the program invokes. One important feature of our system is that it does not modify the program that it executes (e.g., through API call hooking or breakpoints), making it more difficult to detect by malicious code. Also, our tool runs binaries in an unmodified Windows environment,
U. Bayer (B)
Ikarus Software,
Fillgradergasse 7, 1060, Vienna, Austria e-mail: ulli@seclab.tuwien.ac.at
A. Moser · C. Kruegel · E. Kirda
Secure Systems Lab,
Technical University Vienna,
Vienna, Austria e-mail: andy@seclab.tuwien.ac.at
C. Kruegel e-mail: chris@seclab.tuwien.ac.at
E. Kirda e-mail: ek@seclab.tuwien.ac.at

which leads to



References: 1. Bellard, F.: Qemu, a fast and portable dynamic translator. In: Usenix Annual Technical Conference, 2005 3. Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-aware malware detection. In: IEEE Symposium on Security and Privacy, 2005 4. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Conference on Principles of Programming Languages (POPL), 1998 malicious code attacks, 2006. http://www.computereconomics.com/ article.cfm?id=1090 7. Kaspersky Lab: antivirus software, 2006. http://www. and Communications Security (CCS), 2003 10 11. Microsoft IFS KIT, 2006. http://www.microsoft.com/whdc/ devtools/ifskit 12. Microsoft PECOFF. Microsoft Portable Executable and Common Object File Format Specification, 2006 Publishing, indianapolis, 2000 15 Conference, 2000 18 Press, Bellevue (2004) 20 (almost) one CPU instruction, 2006. http://invisiblethings.org/ papers/redpill.html 21. Symantec. Internet security threat report, 2005. http://www. Wesley, Reading (2005) 23 Computer Security Applications Conference, 2005 24 PhD Thesis, University of Virginia (2001) 26 protection, 1993. http://vx.netlux.org/lib/ayt01.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Coding sheet was made for quantification which will be analyzed quantitatively in the final chapter of Discussion and Analysis.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Kak, A. (2012). Lecture notes on “computer and network security”. (Lecture Notes, Purdue University Retrieved from https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture20.pdf…

    • 2890 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    First, is need to know the amount of information this analysis will involve, in this section a…

    • 958 Words
    • 7 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Best Essays

    References: Stoneburner, Gary. “Computer Security”, Retrieved November 11, 2011, From National Institute of Standards and Technology at http://csrc.nist.gov/publications/nistpubs/800-27A/SP800-27-RevA.pdf…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    14 4.4. Analysis Documents And Data…………………………………..… 14 4.5. Method Of Data Analysis…………………………………………. …14 4.5.1.…

    • 3667 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Biology

    • 1833 Words
    • 8 Pages

    (Received : May. 20, 2009, Revised : Jun. 02, 2009, Accepted : Jun. 12, 2009)…

    • 1833 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Criminal Justice

    • 428 Words
    • 2 Pages

    most statistical analyses no longer require access to a huge and expensive mainframe computer. Instead a simple personal computer can do it.…

    • 428 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R. & Murukan, A. (2003, June). Threats and countermeasures. Microsoft. Retrieved from http://msdn.microsoft.com/en-us/library/ff648641.aspx…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    In this book The Giver, written by Louis Lowry, we are introduced to something very extreme. In this book we are introduced to a community where no freedom is given. In this community, everyone acts the same; They all see in black and white, go to bed at the same time, wake up at the same time, and everyone has the same routines. In this book we go through the important years of Jonas’s life. Jonas learns that there are goods and bads in these years, soon coming to realize everything is not as it seems.…

    • 663 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Received: 16 July 2012 / Accepted: 17 August 2012 / Published online: 18 September 2012…

    • 6110 Words
    • 25 Pages
    Powerful Essays
  • Better Essays

    References: Grow, L., Carr, J., Kodak, T., Jostad, C., & Kisamore, A. (2011.). A Comparison of Methods for…

    • 2066 Words
    • 9 Pages
    Better Essays
  • Good Essays

    In order for management to determine which analysis technique is suitable they should consider the availability or resources for analysis, the experience of the analysts with the different techniques, the size and complexity of the project, the project phase in which the analysis takes place, the available information, and the purpose of the analysis. In any assessment that requires data management should consider accuracy, adequacy, relevancy, coherence, impartiality, direction, logicality, and validity.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The internet has aided to criminal activity by providing an increased amount of anonymity for the criminal. They are able to commit crimes from long distances even from other countries. Most people feel protected because they are not physically near the person they are committing the crime against. Computer related crimes have become prevalent in recent years as many aspects of human life are consumed by the use of computers and electronic communication. This inspires fear in consumers from conducting business online. Our economy is the backbone of our country and without the means of security to do our day to day business, people will stop spending money as freely which in turn leads to downsizing and loss of jobs. People who damage other people’s credit for their own gain start a ripple effect towards the decline of consumer confidence and loss of livelihood.…

    • 1155 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Bangladesh Airline Poll 2011

    • 2263 Words
    • 10 Pages

    1. Study Objective & Method .................................................................................................... 4 1.1. Study Objective ............................................................................................................... 4 1.2. Information Coverage ..................................................................................................... 4 1.3. Target Respondents ......................................................................................................... 5 1.4. Geographical Coverage ................................................................................................... 5 1.5. Sample size ..................................................................................................................... 5 1.6. Respondent selection procedure ..................................................................................... 5 1.7. Respondent information .................................................................................................. 6 1.8. Survey Period .................................................................................................................. 6 2. Findings.................................................................................................................................. 7 2.1 Service.............................................................................................................................. 8 2.1.1. Airline for Best Domestic In-flight Service ............................................................. 8 2.1.2. Airline for Best International in-flight Service ........................................................ 8…

    • 2263 Words
    • 10 Pages
    Satisfactory Essays