KUBO: a framework for automated efficacy testing of anti-virus behavioral detection with procedure-based malware emulation

Jakub Pruzinec, Quynh Anh Nguyen, A. Baldwin, Jonathan Griffin, Yang Liu
{"title":"KUBO: a framework for automated efficacy testing of anti-virus behavioral detection with procedure-based malware emulation","authors":"Jakub Pruzinec, Quynh Anh Nguyen, A. Baldwin, Jonathan Griffin, Yang Liu","doi":"10.1145/3548659.3561307","DOIUrl":null,"url":null,"abstract":"Traditional testing of Anti-Virus (AV) products is usually performed on a curated set of malware samples. While this approach can evaluate an AV's overall performance on known threats, it fails to provide details on the coverage of exact attack techniques used by adversaries and malware. Such coverage information is crucial in helping users understand potential attack paths formed using new code and combinations of known attack techniques. This paper describes KUBO, a framework for systematic large-scale testing of behavioral coverage of AV software. KUBO uses a novel malware behavior emulation method to generate a large number of attacks from combinations of adversarial procedures and runs them against a set of AVs. Contrary to other emulators, our attacks are coordinated by the adversarial procedures themselves, rendering the emulated malware independent of agents and semantically coherent. We perform an evaluation of KUBO on 7 major commercial AVs utilizing tens of distinct attack procedures and thousands of their combinations. The results demonstrate that our approach is feasible, leads to automatic large-scale evaluation, and is able to unveil a multitude of open attack paths. We show how the results can be used to assess general behavioral efficacy and efficacy with respect to individual adversarial procedures.","PeriodicalId":264587,"journal":{"name":"Proceedings of the 13th International Workshop on Automating Test Case Design, Selection and Evaluation","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 13th International Workshop on Automating Test Case Design, Selection and Evaluation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3548659.3561307","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Traditional testing of Anti-Virus (AV) products is usually performed on a curated set of malware samples. While this approach can evaluate an AV's overall performance on known threats, it fails to provide details on the coverage of exact attack techniques used by adversaries and malware. Such coverage information is crucial in helping users understand potential attack paths formed using new code and combinations of known attack techniques. This paper describes KUBO, a framework for systematic large-scale testing of behavioral coverage of AV software. KUBO uses a novel malware behavior emulation method to generate a large number of attacks from combinations of adversarial procedures and runs them against a set of AVs. Contrary to other emulators, our attacks are coordinated by the adversarial procedures themselves, rendering the emulated malware independent of agents and semantically coherent. We perform an evaluation of KUBO on 7 major commercial AVs utilizing tens of distinct attack procedures and thousands of their combinations. The results demonstrate that our approach is feasible, leads to automatic large-scale evaluation, and is able to unveil a multitude of open attack paths. We show how the results can be used to assess general behavioral efficacy and efficacy with respect to individual adversarial procedures.
KUBO:一个基于程序的恶意软件仿真的反病毒行为检测的自动功效测试框架
反病毒(AV)产品的传统测试通常是在一组精心策划的恶意软件样本上进行的。虽然这种方法可以评估AV在已知威胁下的整体性能,但它无法提供对手和恶意软件使用的确切攻击技术覆盖范围的详细信息。这些覆盖信息对于帮助用户理解使用新代码和已知攻击技术组合形成的潜在攻击路径至关重要。本文描述了一个用于系统大规模测试反病毒软件行为覆盖率的框架KUBO。KUBO使用一种新颖的恶意软件行为模拟方法,从对抗程序的组合中生成大量攻击,并对一组自动驾驶汽车进行运行。与其他模拟器相反,我们的攻击由对抗程序本身协调,使模拟的恶意软件独立于代理并在语义上一致。我们使用数十种不同的攻击程序和数千种组合对7种主要商用av进行KUBO评估。结果表明,我们的方法是可行的,可以实现自动大规模评估,并能够揭示大量开放的攻击路径。我们展示了如何使用结果来评估一般的行为功效和个体对抗程序的功效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信