Rethinking anti-emulation techniques for large-scale software deployment

Cited 7 time in webofscience Cited 8 time in scopus
  • Hit : 1105
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorJang, Daeheeko
dc.contributor.authorJeong, Yunjongko
dc.contributor.authorLEE, SEONG MANko
dc.contributor.authorPark, Minjoonko
dc.contributor.authorKwak, Kuenhwanko
dc.contributor.authorKim, Dongukko
dc.contributor.authorKang, Brent Byunghoonko
dc.date.accessioned2019-05-29T02:25:13Z-
dc.date.available2019-05-29T02:25:13Z-
dc.date.created2019-05-28-
dc.date.created2019-05-28-
dc.date.created2019-05-28-
dc.date.issued2019-06-
dc.identifier.citationCOMPUTERS & SECURITY, v.83, pp.182 - 200-
dc.identifier.issn0167-4048-
dc.identifier.urihttp://hdl.handle.net/10203/262254-
dc.description.abstractFrom the security perspective, emulation is often utilized to analyze unknown malware owing to its capability of tracing fine-grained runtime behavior (i.e., execution path exploration). To this end, attackers equip their malware with powerful anti-emulation techniques that fingerprint the emulated system environment, thereby avoiding dynamic analysis. However, this is not the only use case of anti-emulation. Recently, legitimate software vendors are also putting significant efforts to prevent their products running on top of the emulated execution environment. There are mainly two reasons for this which are: (i) securing the intellectual property from emulation-assisted reverse-engineering, and (ii) disallowing the customers using the application without purchasing the actual hardware. From the previous literature, various anti-emulation techniques were explored. Unfortunately, existing techniques are mostly discussed and developed with malware's perspective. In this paper, we flip this conventional paradigm and discuss anti-emulation techniques in terms of protecting Commercial-Off-the-Shelf (COTS) software. Due to the higher requirements for usability, existing anti-emulation techniques are inapt for large-scale application vendors. To overcome such problem, we introduce three new techniques in vendors perspective for deploying their product. We evaluate the efficacy of our techniques in five aspects: (i) fast detection speed, (ii) high accuracy, (iii) low power consumption, (iv) a broad range of compatibility, and (v) high cost of bypassing. Based on our experiments, we demonstrate that misaligning the vectorization (e.g., Intel SIMD, ARM NEON) can be utilized as a promising anti-emulation technique among the proposed ones. To confirm the effectiveness, we applied our technology against 176 real Android devices and various emulators as a test bed. (C) 2019 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.titleRethinking anti-emulation techniques for large-scale software deployment-
dc.typeArticle-
dc.identifier.wosid000465367100014-
dc.identifier.scopusid2-s2.0-85062303262-
dc.type.rimsART-
dc.citation.volume83-
dc.citation.beginningpage182-
dc.citation.endingpage200-
dc.citation.publicationnameCOMPUTERS & SECURITY-
dc.identifier.doi10.1016/j.cose.2019.02.005-
dc.contributor.localauthorKang, Brent Byunghoon-
dc.contributor.nonIdAuthorKwak, Kuenhwan-
dc.contributor.nonIdAuthorKim, Donguk-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorAnti emulation-
dc.subject.keywordAuthorSoftware analysis-
dc.subject.keywordAuthorLarge scale deployment-
dc.subject.keywordAuthorMisaligned vectorization-
dc.subject.keywordAuthorCommercial-off-the-shelf-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 7 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0