Safe and Automated Live Malware Experimentation on Public Testbeds∗

Safe and Automated Live Malware Experimentation on Public Testbeds∗

Safe and Automated Live Malware Experimentation on Public Testbeds∗ Abdulla Alwabel Hao Shi Genevieve Bartlett Jelena Mirkovic USC/ISI USC/ISI USC/ISI USC/ISI Abstract veloped by them, and closed to outsiders. These spe- In this paper, we advocate for publicly accessible live cialized environments often require expert human inter- malware experimentation testbeds. We introduce new vention to identify malware communication or set poli- advancements for high-fidelity transparent emulation cies [16, 13, 5, 14]. Such solutions do not scale and can- and fine-grain automatic containment that make such ex- not guarantee safety. perimentation safe and useful to researchers, and we pro- Case for public live-malware experimentation. We pose a complete, extensible live-malware experimenta- argue that today’s malware research is held back by the tion framework. Our framework, aided by our new tech- manual expert effort required and the exclusivity of ex- nologies, facilitates a qualitative leap from current ex- perimentation environments. We take the position that perimentation practices. It enables specific, detailed and we can and should work towards publicly accessible live quantitative understanding of risk, and safe, fully auto- malware experimentation with automated mechanisms mated experimentation by novice users, with maximum for managing risk, which scale to the sheer volume of utility to the researcher. We present preliminary results new and sophisticated malware, and offer low-barrier to that demonstrate effectiveness of our technologies and entry to experts in other domains who wish to foray into map the path forward for public live-malware experimen- malware research. Requiring very specific expertise and tation. specialized customization not only limits the researcher pool, but also stifles advancement of live malware exper- 1 Introduction imentation and tools. By pooling together resources and Today’s malware is very versatile, quickly evolving and offering a publicly accessible environment for malware professionally developed for a large set of thriving un- experimentation we can gain better cross-domain efforts derground markets. Malware analysis thus attracts many which have the potential to be transformative to malware researchers, especially live analysis, where malware is research. allowed to interact with the Internet. Such analysis is While live malware experimentation on public testbeds inherently risky, as traffic that malware sends to the In- may be considered controversial, malware analysis is a ternet may cause harm—it may create denial-of-service growing field that attracts many novices. The community attack on some remote target, scan it, send spam to it, or needs a safe and accessible path for these researchers to attempt to exploit it. But such analysis is also extremely experiment with malware and build their expertise. With- useful to researchers, as malware may communicate with out such a path, novices may resort to naive and unsafe a bot-master, or other bots in the same botnet, which experimentation that jeopardizes their institutions and in- enables analysis of such communication and botnet in- creases the risk to the Internet. filtration. Moreover, this sort of communication might Missing pieces. We identify two missing pieces re- serve as a trigger to malicious behavior of interest to re- quired to support public live malware experimentation. searchers. First, and most important, automated and flexible con- Tools that manage a malware’s outside communication tainment mechanisms are needed. Such mechanisms must balance risk and research utility and are still in their must have a way to provide real or seemingly-real infancy. Presently, state-of-the-art malware experimen- malware communication with external world, sufficient tation is an elite undertaking. It is conducted by a few to elicit all useful malware behaviors. These mecha- expert research groups in specialized environments de- nisms must allow real malware communication with bot- masters and other bots, and they must not require a hu- ∗ This work is in part supported by the DHS grant #N66001-10- man expert in the loop to make decisions— i.e. which C-2018. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not neces- malware communication should be allowed on to the sarily reflect the views of the Department of Homeland Security. Internet—these decisions must be done in automated 1 fashion to provide scalability and non-expert access. Fi- riences. While our framework and its pieces are still un- nally, the risk of allowed malware communication must der development, we provide in this paper sufficient pre- be precisely quantified, measured and managed. liminary results to demonstrate its effectiveness and use- We propose an automated approach to generating fine- fulness to researchers. Over time, our solutions will in- grained containment policies, that are customized for crease in automation and eventually be used safely with- each connectivity check, and that can automatically out a human expert. This will both advance the experi- evolve as more observations are gathered from malware mentation technologies and tools, and will foster wider analysis. In addition to this policy generation, we also innovation in malware defenses. develop a smart mimicking engine that learns a profile for each public server contacted by malware and repli- 2 Experimentation Framework cates the server locally, so future communication can be Figure 1 shows our proposed architecture for live mal- contained while creating an illusion of full connectivity ware experimentation on a public testbed. While the lay- for malware. out is similar to other frameworks (see Section 3), the We further propose a risk measurement and man- functionalities of the highlighted components (shown in agement engine that monitors outgoing malware traffic blue in the Figure) are novel and provide a qualitative and how this communication is consumed by the Inter- advancement. net. Our management engine uses these observations to In our framework, all malware communication with the quickly detect policies that lead to potential harm to ex- Internet is examined and contained by a dedicated War- ternal hosts and modifies these policies to increase con- den machine. The Warden sits between the Inmate Net- tainment level. work—where malware executes on testbed machines— The second missing piece needed for public live mal- and the outside world. Using a fine-grained firewall and ware experimentation is hi-fidelity emulation of physi- policy engine (Section 2.2), the Warden chooses one of cal machines. Several malware analysis tools develop by the following actions to take with malware traffic: (1) experts are released publicly, such as [9, 23, 6]. Such drop, (2) rewrite, (3) rate-limit, (4) forward on to the In- tools are invaluable to support malware analysis in pub- ternet and (5) redirect to Smart Impersonators—services lic testbeds by novice users. But many of these tools which mimic public Internet servers (Section 2.2.3). use CPU or system emulators to facilitate fine-grained In addition to the firewall and policy engine, the War- dissection of malware functionalities (e.g., Anubis [6], den supports monitoring and data persistence function- TEMU [23], and Bochs [17]). Such analysis also protects alities. These functionalities are supported through con- the host, by isolating it from potentially harmful malware tinuous collection and storing of network traces to cap- actions. But there are subtle differences between opera- ture all communication exchanged between the frame- tion of emulated environments and virtual machines and work and the Internet. The Warden also keeps exper- those of bare-metal physical machines. Malware rou- imental history for each experiment—information such tinely checks for these differences to detect that it is be- as the testbed user, the malware studied, the experimen- ing run in a virtual machine, and modifies its behavior to tal environment, etc. thwart analysis. The Inmate Network consists of a mix of machines, We propose new ways to comprehensively identify some of which run VM software (e.g., QEMU [7], cases where virtual and emulated environments execute VMWare [8], OpenVZ [1] and Xen [21]), while others CPU instructions differently from bare-metal machines, are bare metal machines. Since malware limits its be- and how to compensate for these differences to hide them havior if it detects virtualization, machines that run VM from malware. Our approach is test-driven, fine-grained images would also run our Hi-Fidelity Emulator (HFE) and automated. It can enumerate differences between to defeat virtualization checks. a hardware and a virtual machine effectively and effi- ciently. Compared to the state-of-the-art Red Pill[19], we 2.1 Hi-Fidelity Emulation found five times more pills running fifteen times fewer The challenges for hi-fidelity emulation are (1): create a tests. comprehensive list of differences between a VM and a While currently manual virtual machine modifications bare metal machine, and (2): create “lies” to hide these are needed to hide detected differences from malware, differences. this process requires minimal code writing by a human We draw on Martignoni et al.’s work on Red Pill Test- and is done only once per each virtual machine. ing [19, 18] for enumerating differences between VMs In the following sections we present the architecture and physical machines. Their approach is to define a of our

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us