On the effectiveness of binary emulation in malware classification

Journal of Information Security and Applications(2022)

引用 2|浏览2
暂无评分
摘要
Malware authors continuously evolve their code base to include counter-analysis methods that can significantly hinder their detection and blocking. While malware execution in a sandboxed environment may provide insightful feedback about what the malware does in a machine, anti-virtualisation and hooking evasion methods may allow malware to bypass such detection methods. The main objective of this work is to complement sandbox execution with the use of binary emulation frameworks. The core idea is to exploit the fact that binary emulation frameworks may test samples quicker than a sandbox environment as they do not need to open a whole new virtual machine to execute the binary. While with this approach we lose the granularity of the data collected through a sandbox, one may only need to efficiently determine whether a file is malicious or to which malware family it belongs. To this end, we record the performed API calls and use them to explore the efficacy of using them as features for binary and multiclass classification. Our extensive experiments with real-world malware illustrate that this approach is very accurate, achieving state-of-the art outcomes with a statistically robust set of classification experiments while simultaneously having a relatively low computational overhead compared to traditional sandbox approaches. In fact, we compare the binary analysis results with a commercial sandbox, and our classification outperforms it at the expense of the fine-grained results that a sandbox provides.
更多
查看译文
关键词
Malware,Binary emulation,Classification,Machine learning
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要