On the (in)security of behavioral-based dynamic anti-malware techniques

The Internet has become the primary vector for the delivery of malicious code in cyber attacks, and malware has rapidly become a pervasive critical threat. Anti- malware products offer effective protection from malware threats for servers and endpoint devices using a variety of techniques. Advanced...

Full description

Bibliographic Details
Main Author: Ersan, Erkan
Other Authors: Malka, Lior
Language:English
en
Published: 2017
Subjects:
CFI
ROP
Online Access:http://hdl.handle.net/1828/7935
id ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-7935
record_format oai_dc
spelling ndltd-uvic.ca-oai-dspace.library.uvic.ca-1828-79352017-04-23T17:02:46Z On the (in)security of behavioral-based dynamic anti-malware techniques Ersan, Erkan Malka, Lior Kapron, Bruce M. (Bruce Michael) Malware Malware Detection Behavioral-based Dynamic Anti-Malware Techniques Computer Security Anti-malware Antivirus Cyber Attacks Behavioral-based Detection EMET Hooking Unhooking Guard Pages Bypassing Techniques Evasion Techniques Evasion funneling Control Flow Integrity CFI Web-based malware ROP Return-Oriented Programming Shellcode Payload Windows Anti-malware Evaluation Antivirus Evaluation Anti-malware Effectiveness Antivirus Effectiveness The Internet has become the primary vector for the delivery of malicious code in cyber attacks, and malware has rapidly become a pervasive critical threat. Anti- malware products offer effective protection from malware threats for servers and endpoint devices using a variety of techniques. Advanced enterprise-level anti-malware products rely on state-of-art behavioral-based detection algorithms, in addition to traditional signature-based mechanisms. These dynamic detection techniques have been around for more than a decade and in response hackers have developed methods to evade them. However, currently known bypass methods require intensive manual labor. Moreover, this manual work has to be repeated whenever a parameter of the environment (such as the payload, operating system, Antivirus version, etc) changes, making these methods impractical. This may lead to the belief that dynamic techniques provide a good deterrence, and hence good protection. In this thesis we evaluate dynamic techniques. Specifically, we build tools to implement generic unhooking and funneling, and using these tools we show how dynamic techniques can be bypassed with considerably less effort than by fully manual methods. We also extend the repertoire of existing bypass methods and introduce a new malicious function call technique which exploits detection techniques that monitor a limited collection of critical system functions, as well as a method for bypassing guard-page protections. We demonstrate the effectiveness of all our techniques by conducting attacks against two enterprise antivirus products. Our results lead us to conclude that that dynamic techniques do not provide sufficient protection. Graduate 2018-02-07 0984 erkanersan@gmail.com 2017-04-21T14:42:40Z 2017 2017-04-21 Thesis http://hdl.handle.net/1828/7935 English en Available to the World Wide Web
collection NDLTD
language English
en
sources NDLTD
topic Malware
Malware Detection
Behavioral-based Dynamic Anti-Malware Techniques
Computer Security
Anti-malware
Antivirus
Cyber Attacks
Behavioral-based Detection
EMET
Hooking
Unhooking
Guard Pages
Bypassing Techniques
Evasion Techniques
Evasion
funneling
Control Flow Integrity
CFI
Web-based malware
ROP
Return-Oriented Programming
Shellcode
Payload
Windows
Anti-malware Evaluation
Antivirus Evaluation
Anti-malware Effectiveness
Antivirus Effectiveness
spellingShingle Malware
Malware Detection
Behavioral-based Dynamic Anti-Malware Techniques
Computer Security
Anti-malware
Antivirus
Cyber Attacks
Behavioral-based Detection
EMET
Hooking
Unhooking
Guard Pages
Bypassing Techniques
Evasion Techniques
Evasion
funneling
Control Flow Integrity
CFI
Web-based malware
ROP
Return-Oriented Programming
Shellcode
Payload
Windows
Anti-malware Evaluation
Antivirus Evaluation
Anti-malware Effectiveness
Antivirus Effectiveness
Ersan, Erkan
On the (in)security of behavioral-based dynamic anti-malware techniques
description The Internet has become the primary vector for the delivery of malicious code in cyber attacks, and malware has rapidly become a pervasive critical threat. Anti- malware products offer effective protection from malware threats for servers and endpoint devices using a variety of techniques. Advanced enterprise-level anti-malware products rely on state-of-art behavioral-based detection algorithms, in addition to traditional signature-based mechanisms. These dynamic detection techniques have been around for more than a decade and in response hackers have developed methods to evade them. However, currently known bypass methods require intensive manual labor. Moreover, this manual work has to be repeated whenever a parameter of the environment (such as the payload, operating system, Antivirus version, etc) changes, making these methods impractical. This may lead to the belief that dynamic techniques provide a good deterrence, and hence good protection. In this thesis we evaluate dynamic techniques. Specifically, we build tools to implement generic unhooking and funneling, and using these tools we show how dynamic techniques can be bypassed with considerably less effort than by fully manual methods. We also extend the repertoire of existing bypass methods and introduce a new malicious function call technique which exploits detection techniques that monitor a limited collection of critical system functions, as well as a method for bypassing guard-page protections. We demonstrate the effectiveness of all our techniques by conducting attacks against two enterprise antivirus products. Our results lead us to conclude that that dynamic techniques do not provide sufficient protection. === Graduate === 2018-02-07 === 0984 === erkanersan@gmail.com
author2 Malka, Lior
author_facet Malka, Lior
Ersan, Erkan
author Ersan, Erkan
author_sort Ersan, Erkan
title On the (in)security of behavioral-based dynamic anti-malware techniques
title_short On the (in)security of behavioral-based dynamic anti-malware techniques
title_full On the (in)security of behavioral-based dynamic anti-malware techniques
title_fullStr On the (in)security of behavioral-based dynamic anti-malware techniques
title_full_unstemmed On the (in)security of behavioral-based dynamic anti-malware techniques
title_sort on the (in)security of behavioral-based dynamic anti-malware techniques
publishDate 2017
url http://hdl.handle.net/1828/7935
work_keys_str_mv AT ersanerkan ontheinsecurityofbehavioralbaseddynamicantimalwaretechniques
_version_ 1718443527535329280