2006 IEEE Symposium on Security and Privacy (S&P'06) 2006
DOI: 10.1109/sp.2006.9
|View full text |Cite
|
Sign up to set email alerts
|

Cobra: fine-grained malware analysis using stealth localized-executions

Abstract: Fine-grained code analysis in the context of malware is a complex and challenging task that provides insight into malware code-layers (polymorphic/metamorphic), its data encryption/decryption engine, its memory layout etc., important pieces of information that can be used to detect and counter the malware and its variants. Current research in fine-grained code analysis can be categorized into static and dynamic approaches. Static approaches have been tailored towards malware and allow exhaustive fine-grained m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
35
0
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 67 publications
(40 citation statements)
references
References 24 publications
(23 reference statements)
1
35
0
1
Order By: Relevance
“…Vasudevan and Yerraballi proposed Cobra [58], which is a first dynamic analysis system focused on countering antianalysis techniques. Dinaburg et al proposed Ether [24], a transparent sandbox using hardware virtualization extensions such as Intel VT. Those systems focus on how to conceal the existence of analysis mechanisms from malware.…”
Section: Transparent/bare-metal Sandboxesmentioning
confidence: 99%
“…Vasudevan and Yerraballi proposed Cobra [58], which is a first dynamic analysis system focused on countering antianalysis techniques. Dinaburg et al proposed Ether [24], a transparent sandbox using hardware virtualization extensions such as Intel VT. Those systems focus on how to conceal the existence of analysis mechanisms from malware.…”
Section: Transparent/bare-metal Sandboxesmentioning
confidence: 99%
“…Cobra, a framework by Vasudevan and Yerraballi [43], is known to be one of the first malware dynamic analysis frameworks with an explicit emphasis on stealth as a design goal, also providing support for self-modifying, self-checking code, and any form of code obfuscation. A somewhat stronger solution was proposed by Dinaburg et al [8].…”
Section: Related Workmentioning
confidence: 99%
“…A sandbox consists of a virtual machine and a simulated environment which are used to run suspicious executables for a limited time span. Depending on the sequence of actions, the simulated program is classified as malicious or benign [8], [9], [10], [11]. Sandbox-based systems suffer from the same restrictions as HIDS, but additionally monitor a program only over a short timeframe, making them blind towards malware that does not execute its payload right away.…”
Section: Related Workmentioning
confidence: 99%