Proceedings of the 28th Annual Computer Security Applications Conference 2012
DOI: 10.1145/2420950.2421000
|View full text |Cite
|
Sign up to set email alerts
|

Towards network containment in malware analysis systems

Abstract: This paper focuses on the containment and control of the network interaction generated by malware samples in dynamic analysis environments. A currently unsolved problem consists in the existing dependency between the execution of a malware sample and a number of external hosts (e.g. C&C servers). This dependency affects the repeatability of the analysis, since the state of these external hosts influences the malware execution but it is outside the control of the sandbox. This problem is also important from a c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
2

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 12 publications
0
9
0
2
Order By: Relevance
“…Todos estos valores se han recogido de manera automática mediante la ejecución desatendida de PinVMShield dentro del entorno de sandbox de Cuckoo Sandbox (versión 0.6) [14], una herramienta de código abierta ampliamente usada por la comunidad de análisis de software malicioso [23][45] [46].…”
Section: A Herramienta Pafishunclassified
“…Todos estos valores se han recogido de manera automática mediante la ejecución desatendida de PinVMShield dentro del entorno de sandbox de Cuckoo Sandbox (versión 0.6) [14], una herramienta de código abierta ampliamente usada por la comunidad de análisis de software malicioso [23][45] [46].…”
Section: A Herramienta Pafishunclassified
“…Forced path execution for binaries have been extensively discussed in [14], [15], [16] and some of the obfuscation techniques for Android malware have appeared in [17], [18], [19]. However, we are not aware of any large-scale study that attempted to analyze mobile applications in terms of copyright infringement.…”
Section: Related Workmentioning
confidence: 99%
“…To gain access a hacker might try different vulnerabilities in a host while automated programs are the exact opposite; they use the same exploits on all the hosts hoping to find a host with a weak point [9,10].…”
Section: Automated Attack Programsmentioning
confidence: 99%