skip to main content
10.1145/3660512.3665526acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Interactive Assistance in Malware Dissemination Detection and Analysis

Published: 01 July 2024 Publication History

Abstract

Analysis of a complex cyber-security attack often involves a variety of tools, for each specific payload used in the attack. The information supplied by these tools must be soundly correlated to obtain a correct verdict. We propose a tool, GView, that is designed to investigate cyber-attacks by providing guided analysis for various file types using automatic artifact identification, extraction, coherent correlation & inference, and meaningful & intuitive views at different levels of granularity w.r.t. revealed information. The concept behind GView simplifies navigation through all payloads in a complex attack, streamlining the process for security researchers, and increasing the quality of analysis. Our evaluation shows that GView improves the analysis time of an attack by up to 90% compared to conventional tools used in forensics. We show a scenario where GView is used to analyze a misleading email.

References

[1]
R. AlHarbi, A. AlZahrani, and W.A. Bhat. 2022. Forensic analysis of anti-forensic file-wiping tools on Windows. Journal of Forensic Sciences 67, 2 (2022), 562–587. https://doi.org/10.1111/1556-4029.14907
[2]
Ö. Aslan. 2017. Performance comparison of static malware analysis tools versus antivirus scanners to detect malware. In International Multidisciplinary Studies Congress (IMSC).
[3]
P. Ferrie. 2008. Malware analysis whither the harums?Virus Bulletin (2008).
[4]
D. Herity. 1998. C++ in embedded systems: Myth and reality. Embedded Systems Programming 11, 2 (1998), 48–71.
[5]
E. Hjelmvik. 2019. Intro to NetworkMiner. https://weberblog.net/intro-to-networkminer/.
[6]
J. Kävrestad. 2018. Open-Source or Freeware Tools. Springer International Publishing, Cham, 153–172. https://doi.org/10.1007/978-3-319-96319-8_14
[7]
B. Knighton and C. Delikat. 2019. GHIDRA Software Reverse Engineering Framework. Black Hat USA.
[8]
Kyle Martin. 2019. Binary Ninja Blog.
[9]
N. Miramirkhani, MP. Appini, N. Nikiforakis, and M. Polychronakis. 2017. Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts. In 2017 IEEE Symposium on Security and Privacy (SP). 1009–1024. https://doi.org/10.1109/SP.2017.42
[10]
MITRE ATT&CK. 2015. Cyber Kill Chain. https://www.mitre.org/sites/default/files/publications/active_defense_strategy.pdf
[11]
MITRE ATT&CK. 2015. Enterprise Matrix. https://attack.mitre.org/matrices/enterprise/
[12]
SU. Mostfa and R. Alsaqour. 2016. Performance evaluation of UDP based on traffic size and traffic load using NS2. ARPN Journal of Engineering and Applied Sciences 11, 9 (2016), 5551–5558.
[13]
O. Pal, V. Kumar, R. Khan, B. Alam, and M. Alam. 2023. Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain and Quantum Cryptography. CRC Press. https://books.google.ro/books?id=OgHGEAAAQBAJ
[14]
Jay Peters. 2024. How hackers took over Linus Tech Tips. https://www.theverge.com/2023/3/24/23654996/linus-tech-tips-channel-hack-session-token-elon-musk-crypto-scam. Accessed: 2024-04-14.
[15]
J. Saxe and H. Sanders. 2018. Malware data science: attack detection and attribution. No Starch Press.
[16]
P. Vanparia, Y. Ghodasara, and H. Donga. 2015. Network Protocol Analyzer with Wireshark. developeriq.in (03 2015). https://www.researchgate.net/publication/282385189_Network_Protocol_Analyzer_with_Wireshark
[17]
H. Wen, Z. Lin, and Y. Zhang. 2020. FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (Virtual Event, USA) (CCS ’20). Association for Computing Machinery, New York, NY, USA, 167–180. https://doi.org/10.1145/3372297.3423344
[18]
R. Wong. 2018. Mastering Reverse Engineering: Re-engineer your ethical hacking skills. Packt Publishing. https://books.google.ro/books?id=Q-l1DwAAQBAJ
[19]
A. Yokoyama, K. Ishii, R. Tanabe, Y. Papa, K. Yoshioka, T. Matsumoto, T. Kasama, D. Inoue, M. Brengel, M. Backes, and C. Rossow. 2016. SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion. In Research in Attacks, Intrusions, and Defenses, F. Monrose, M. Dacier, G. Blanc, and J. Garcia-Alfaro (Eds.). Springer International Publishing, Cham, 165–187.
[20]
Raul Zaharia, Dragoş Gavriluţ, Gheorghiţă Mutu, and Dorel Lucanu. 2024. GView: A Versatile Assistant for Security Researchers. arxiv:2404.09058 [cs.CR]
[21]
Raul Zaharia, Dragoș Gavriluț, Gheorghiță Mutu, and Dorel Lucanu. 2023. GView: email sponsorship scenario. https://youtu.be/LpsvcgCkII8.

Cited By

View all
  • (2024)A Software Engineering Approach into Analyzing Microsoft Office-Based Email Attacks2024 26th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)10.1109/SYNASC65383.2024.00031(113-117)Online publication date: 16-Sep-2024
  • (2024)Concepts Involved in Creating an Interactive Viewer for Disassembly2024 26th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)10.1109/SYNASC65383.2024.00029(107-110)Online publication date: 16-Sep-2024
  • (2024)Entropy-Driven Visualization in GView: Unveiling the Unknown in Binary File Formats2024 26th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)10.1109/SYNASC65383.2024.00025(74-81)Online publication date: 16-Sep-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SCID '24: Proceedings of the 1st Workshop on Security-Centric Strategies for Combating Information Disorder
July 2024
68 pages
ISBN:9798400706509
DOI:10.1145/3660512
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. complex binary analysis
  2. forensics investigation
  3. malware research
  4. security operations center

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ASIA CCS '24
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)70
  • Downloads (Last 6 weeks)6
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Software Engineering Approach into Analyzing Microsoft Office-Based Email Attacks2024 26th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)10.1109/SYNASC65383.2024.00031(113-117)Online publication date: 16-Sep-2024
  • (2024)Concepts Involved in Creating an Interactive Viewer for Disassembly2024 26th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)10.1109/SYNASC65383.2024.00029(107-110)Online publication date: 16-Sep-2024
  • (2024)Entropy-Driven Visualization in GView: Unveiling the Unknown in Binary File Formats2024 26th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)10.1109/SYNASC65383.2024.00025(74-81)Online publication date: 16-Sep-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media