Fighting Evasive Malware with DVasion

dc.contributor.advisorBarua, Rajeeven_US
dc.contributor.authorGilboy, Matthew Ryanen_US
dc.contributor.departmentElectrical Engineeringen_US
dc.contributor.publisherDigital Repository at the University of Marylanden_US
dc.contributor.publisherUniversity of Maryland (College Park, Md.)en_US
dc.date.accessioned2016-06-22T06:16:08Z
dc.date.available2016-06-22T06:16:08Z
dc.date.issued2016en_US
dc.description.abstractMalware is a foundational component of cyber crime that enables an attacker to modify the normal operation of a computer or access sensitive, digital information. Despite the extensive research performed to identify such programs, existing schemes fail to detect evasive malware, an increasingly popular class of malware that can alter its behavior at run-time, making it difficult to detect using today’s state of the art malware analysis systems. In this thesis, we present DVasion, a comprehensive strategy that exposes such evasive behavior through a multi-execution technique. DVasion successfully detects behavior that would have been missed by traditional, single-execution approaches, while addressing the limitations of previously proposed multi-execution systems. We demonstrate the accuracy of our system through strong parallels with existing work on evasive malware, as well as uncover the hidden behavior within 167 of 1,000 samples.en_US
dc.identifierhttps://doi.org/10.13016/M2HB7D
dc.identifier.urihttp://hdl.handle.net/1903/18396
dc.language.isoenen_US
dc.subject.pqcontrolledComputer engineeringen_US
dc.subject.pquncontrolleddynamic binary instrumentationen_US
dc.subject.pquncontrolledevasive malwareen_US
dc.subject.pquncontrolledmulti-executionen_US
dc.titleFighting Evasive Malware with DVasionen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Gilboy_umd_0117N_17154.pdf
Size:
831.27 KB
Format:
Adobe Portable Document Format