Detecting emulated environment : exploiting behavioral discrepancies In QEMU에뮬레이터와 하드웨어의 행동 차이를 사용한 QEMU 탐지 기법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 517
  • Download : 0
DC FieldValueLanguage
dc.contributor.advisorKang, Brent Byunghoon-
dc.contributor.advisor강병훈-
dc.contributor.authorLee, Jaehyuk-
dc.date.accessioned2018-06-20T06:24:57Z-
dc.date.available2018-06-20T06:24:57Z-
dc.date.issued2015-
dc.identifier.urihttp://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=669193&flag=dissertationen_US
dc.identifier.urihttp://hdl.handle.net/10203/243491-
dc.description학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2015.8,[vi, 38 p. :]-
dc.description.abstractQEMU is being widely used for emulating hardware. The emulation technology can be applied to various fields, one of the good example is dynamic malware analysis. A number of state-of-the-art malware analysis platforms are based on the QEMU. As the emulation is popularly deployed to analyze the behavior, malwares equip themselves with various anti-emulation techniques to fingerprint the QEMU environment. Research communities start to develop stealthy malware analysis platforms that manipulate the run-time environment to make malware misapprehend it is running on a native environment.Despite the fact that malware analysis platforms are equipped with stealth technology, discrepancies created by complicated hardware logics are exploited by attacker to detect emulated environment. It's an arms race between attacker who wants to conceal malicious behavior and defender who wants to reveal undisclosed malware. This paper systematically locate previous timing based QEMU detection methods using lazy TLB emulation and introduce new detection mechanism based on the characteristic of Tiny Code Generator(TCG) and behavioral discrepancies in QEMU which could be easily exploited for detecting emulated environment with least privileges and higher detection rate than previous works. We hope this paper alarm research communities and drive them to consider it in developing stealthy malware analysis platform.-
dc.languageeng-
dc.publisher한국과학기술원-
dc.subjectQEMU-
dc.subjectEmulator Detection-
dc.subjectTiny Code Generator(TCG)-
dc.subjectRace condition-
dc.subjectTiming attack-
dc.subject큐이엠유-
dc.subject에뮬레이터 탐지-
dc.subject동적 코드 분석기-
dc.subject레이스 컨디션-
dc.subject시간차 공격-
dc.titleDetecting emulated environment-
dc.title.alternative에뮬레이터와 하드웨어의 행동 차이를 사용한 QEMU 탐지 기법-
dc.typeThesis(Master)-
dc.identifier.CNRN325007-
dc.description.department한국과학기술원 :정보보호대학원,-
dc.contributor.alternativeauthor이재혁-
dc.title.subtitleexploiting behavioral discrepancies In QEMU-
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0