Issue |
Security and Safety
Volume 2, 2023
|
|
---|---|---|
Article Number | 2023023 | |
Number of page(s) | 24 | |
Section | Other Fields | |
DOI | https://doi.org/10.1051/sands/2023023 | |
Published online | 05 September 2023 |
Research Article
Multi-path exploration guided by taint and probability against evasive malware
1
National Engineering Research Center for Big Data Technology and System, Wuhan, 430074, China
2
Services Computing Technology and System Lab, Cluster and Grid Computing Lab, Wuhan, 430074, China
3
Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, Wuhan, 430074, China
4
School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, 430074, China
5
School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China
6
Jinyinhu Laboratory, Wuhan, 430040, China
* Corresponding authors (email: wzqiang@hust.edu.cn)
Received:
8
May
2023
Revised:
20
June
2023
Accepted:
11
August
2023
Static analysis is often impeded by malware obfuscation techniques, such as encryption and packing, whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information. Unfortunately, malware can employ evasive techniques to detect the analysis environment and alter its behavior accordingly. While known evasive techniques can be explicitly dismantled, the challenge lies in generically dismantling evasions without full knowledge of their conditions or implementations, such as logic bombs that rely on uncertain conditions, let alone unsupported evasive techniques, which contain evasions without corresponding dismantling strategies and those leveraging unknown implementations. In this paper, we present Antitoxin, a prototype for automatically exploring evasive malware. Antitoxin utilizes multi-path exploration guided by taint analysis and probability calculations to effectively dismantle evasive techniques. The probabilities of branch execution are derived from dynamic coverage, while taint analysis helps identify paths associated with evasive techniques that rely on uncertain conditions. Subsequently, Antitoxin prioritizes branches with lower execution probabilities and those influenced by taint analysis for multi-path exploration. This is achieved through forced execution, which forcefully sets the outcomes of branches on selected paths. Additionally, Antitoxin employs active anti-evasion countermeasures to dismantle known evasive techniques, thereby reducing exploration overhead. Furthermore, Antitoxin provides valuable insights into sensitive behaviors, facilitating deeper manual analysis. Our experiments on a set of highly evasive samples demonstrate that Antitoxin can effectively dismantle evasive techniques in a generic manner. The probability calculations guide the multi-path exploration of evasions without requiring prior knowledge of their conditions or implementations, enabling the dismantling of unsupported techniques such as C2 and significantly improving efficiency compared to linear exploration when dealing with complex control flows. Additionally, taint analysis can accurately identify branches related to logic bombs, facilitating preferential exploration.
Key words: Malware analysis / dynamic binary instrumentation / forced execution / taint analysis / evasion detection
Citation: Xu F,Zhang W, Qiang W et al. Multi-path exploration guided by taint and probability against evasive malware. Security and Safety 2023; 2: 2023023. https://doi.org/10.1051/sands/2023023
© The Author(s) 2023. Published by EDP Sciences and China Science Publishing & Media Ltd.
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.