Container-based Sandboxes for Malware Analysis: A Compromise Worth Considering

A. Khalimov, Sofiane Benahmed, Rasheed Hussain, S. Kazmi, A. Oracevic, Fatima Hussain, Farhan Ahmad, Kerrache Chaker Abdelaziz
{"title":"Container-based Sandboxes for Malware Analysis: A Compromise Worth Considering","authors":"A. Khalimov, Sofiane Benahmed, Rasheed Hussain, S. Kazmi, A. Oracevic, Fatima Hussain, Farhan Ahmad, Kerrache Chaker Abdelaziz","doi":"10.1145/3344341.3368810","DOIUrl":null,"url":null,"abstract":"Malware analysis relies on monitoring the behavior of a suspected application within a confined, controlled and secure environment. These environments are commonly referred to as \"Sandboxes'' and are often virtualized replicas of a regular system. Hypervisor-based sandboxes were among the most commonly used techniques for malware analysis during the last decade; however, these sandboxes do not often provide the required stealth and transparency to deceive the malware in believing that it is being run in a target machine. This is due to the difference between virtualized systems and bare metal ones; differences which are exploited by the malware as detection artifacts. In this paper, we address the aforementioned problem by exploring the use of container-based environments as an alternative to hypervisor-based sandboxes for malware analysis. More precisely, we explore different ways to monitor containerized applications and make these containers act and look as close to real systems as possible. Our experimental results revealed that Docker containers are a promising option for a sandbox. However, this option comes at the cost of new detection artifacts which make containers subject to fingerprinting through different sources that malware can easily find. We explore these sources and try to address them by various means including system-call introspection. Finally, based on our discoveries, we introduce a container detection tool that will give the research community an opportunity to investigate malware analysis through containers in more details.","PeriodicalId":261870,"journal":{"name":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3344341.3368810","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

Malware analysis relies on monitoring the behavior of a suspected application within a confined, controlled and secure environment. These environments are commonly referred to as "Sandboxes'' and are often virtualized replicas of a regular system. Hypervisor-based sandboxes were among the most commonly used techniques for malware analysis during the last decade; however, these sandboxes do not often provide the required stealth and transparency to deceive the malware in believing that it is being run in a target machine. This is due to the difference between virtualized systems and bare metal ones; differences which are exploited by the malware as detection artifacts. In this paper, we address the aforementioned problem by exploring the use of container-based environments as an alternative to hypervisor-based sandboxes for malware analysis. More precisely, we explore different ways to monitor containerized applications and make these containers act and look as close to real systems as possible. Our experimental results revealed that Docker containers are a promising option for a sandbox. However, this option comes at the cost of new detection artifacts which make containers subject to fingerprinting through different sources that malware can easily find. We explore these sources and try to address them by various means including system-call introspection. Finally, based on our discoveries, we introduce a container detection tool that will give the research community an opportunity to investigate malware analysis through containers in more details.
基于容器的恶意软件分析沙箱:一个值得考虑的折衷方案
恶意软件分析依赖于在受限、受控和安全的环境中监视可疑应用程序的行为。这些环境通常被称为“沙箱”,通常是常规系统的虚拟化副本。在过去十年中,基于管理程序的沙箱是最常用的恶意软件分析技术之一;然而,这些沙箱通常不能提供所需的隐蔽性和透明度来欺骗恶意软件,使其相信它正在目标机器上运行。这是由于虚拟化系统和裸机系统之间的差异;被恶意软件作为检测工件利用的差异。在本文中,我们通过探索使用基于容器的环境作为恶意软件分析基于管理程序的沙箱的替代方案来解决上述问题。更准确地说,我们探索了监控容器化应用程序的不同方法,并使这些容器的行为和外观尽可能接近真实系统。我们的实验结果表明Docker容器是沙盒的一个很有前途的选择。然而,这种选择的代价是新的检测工件,这些工件使容器容易通过恶意软件可以轻松找到的不同来源进行指纹识别。我们将探索这些来源,并尝试通过包括系统调用自省在内的各种方法来解决它们。最后,基于我们的发现,我们介绍了一个容器检测工具,这将使研究社区有机会通过容器更详细地调查恶意软件分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信