Charla: Hybrid Analysis and Control of Malware

Barton Miller, Computer Sciences Department, University of Wisconsin, USA
30 Octubre, 2012 - 12:00
Auditorio DCC, 3er piso


Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ.  The most prevalent of these techniques are code unpacking, code overwriting, and control transfer obfuscations.  We simplify the analyst's task by analyzing the code prior to its execution and by providing the ability to selectively monitor its execution. We achieve pre-execution analysis by combining static and dynamic techniques to construct control- and data-flow analyses.  These analyses form the interface by which the analyst instruments the code.  This interface simplifies the instrumentation task, allowing us to reduce the number of instrumented program locations by a hundred-fold relative to existing instrumentation-based methods of identifying unpacked code.  We implement our techniques in SD-Dyninst and apply them to a large corpus of malware, performing analysis tasks such as code coverage tests and call-stack traversals that are greatly simplified by hybrid analysis.

(La charla será en inglés.)



Secretaría de Investigación