Automatic Generation of Remediation Procedures for Malware Infections

25
Roberto Paleari, Universit`a degli Studi di Milano Lorenzo Martignoni, Universit`a degli Studi di Udine Emanuele Passerini, Universit`a degli Studi di Milano Drew Davidson, University of Wisconsin Matt Fredrikson, University of Wisconsin Jon Giffin, Georgia Institute of Technology Somesh Jha University of Wisconsin Automatic Generation of Remediation Procedures for Malware Infections 2010 USENIX Security Symposium

description

Automatic Generation of Remediation Procedures for Malware Infections. Roberto Paleari , Universit`a degli Studi di Milano Lorenzo Martignoni , Universit`a degli Studi di Udine Emanuele Passerini , Universit`a degli Studi di Milano Drew Davidson,University of Wisconsin - PowerPoint PPT Presentation

Transcript of Automatic Generation of Remediation Procedures for Malware Infections

Page 1: Automatic Generation of Remediation Procedures for Malware Infections

Roberto Paleari, Universit`a degli Studi di Milano Lorenzo Martignoni, Universit`a degli Studi di UdineEmanuele Passerini, Universit`a degli Studi di MilanoDrew Davidson, University of WisconsinMatt Fredrikson, University of WisconsinJon Giffin, Georgia Institute of TechnologySomesh Jha University of Wisconsin

Automatic Generation of Remediation Procedures for

Malware Infections

2010 USENIX Security Symposium

Page 2: Automatic Generation of Remediation Procedures for Malware Infections

2

Page 3: Automatic Generation of Remediation Procedures for Malware Infections

3

Page 4: Automatic Generation of Remediation Procedures for Malware Infections

4

Outline

IntroductionRelated WorkSystem OverviewSystem DetailsEvaluationDiscussionConclusion

Page 5: Automatic Generation of Remediation Procedures for Malware Infections

5

Introduction

After infection, Format disk and re-install OS

Data backups Commercial anti-malware software

*TRIES TO* Revert the effects performed by malware Unstable, or even failed

Page 6: Automatic Generation of Remediation Procedures for Malware Infections

6

Introduction

In this work… Given binary malware Automatically generate remediation procedures Do not require the information relating to the

infection 98% of the harmful effects reverted

http://pages.cs.wisc.edu/~mfredrik/remediate/

Page 7: Automatic Generation of Remediation Procedures for Malware Infections

7

Related Work

Behavior-based malware analysis Dynamic analysis:

A layered architecture for detecting malicious behaviors, RAID 2008

Panorama: Capturing system-wide information flow for malware detection and analysis, ACM CCS 2007

Behavior-based detection Effective and efficient malware detection at the end host,

USENIX Security Symposium 2009 Clustering

Scalable, behavior-based malware clustering, NDSS 2009

Page 8: Automatic Generation of Remediation Procedures for Malware Infections

8

Related Work

Execution of Untrusted Applications Back to the future: A framework for automatic

malware removal and system repair, ACSAC 2006 One-way isolation: An effective approach for realizing

safe execution environments, NDSS 2005

Page 9: Automatic Generation of Remediation Procedures for Malware Infections

9

System Overview

Page 10: Automatic Generation of Remediation Procedures for Malware Infections

10

System Overview

Page 11: Automatic Generation of Remediation Procedures for Malware Infections

11

System Overview

High-Level Behavior Extraction Analyze the semantics of a program to produce a

sequence of meaningful behaviors

Page 12: Automatic Generation of Remediation Procedures for Malware Infections

12

System Overview

Behavior Generalization Attempt to over-approximate existing paths, thus

encompassing future paths Cluster all instances of the same high-level behavior together Analyze each cluster to generalize the arguments

c:\windows\po[[:alpha:]]{3}.exe

Page 13: Automatic Generation of Remediation Procedures for Malware Infections

13

System Overview

Remediation Procedure Generation Attempt to match each resource (file, process, or

registry key) on the system against the constraints associated with each generalized high-level behavior

c:\windows\po[[:alpha:]]{3}.exe

Page 14: Automatic Generation of Remediation Procedures for Malware Infections

14

System Details

High-Level Behavior Extraction Use QEMU to monitor a malware for its system call

trace

Page 15: Automatic Generation of Remediation Procedures for Malware Infections

15

System Details

Behavior Clustering

Page 16: Automatic Generation of Remediation Procedures for Malware Infections

16

System Details

Comparison isomorphic( )

Page 17: Automatic Generation of Remediation Procedures for Malware Infections

17

System Details

BehaviorGeneralization

Probabilistic finite-state automaton (PFSA) Simulated beam annealing algorithm

Page 18: Automatic Generation of Remediation Procedures for Malware Infections

18

System Details

Page 19: Automatic Generation of Remediation Procedures for Malware Infections

19

System Details

Generating Concrete Remediation Procedures Newly-created resources

DropAndAutostart(file,data,key,value,regdata )

DropAndAutostart(“c : \windows\po[[: alpha :]]{3}.exe”, data, “...Windows\CurrentVersion\Run”,“(vq|qv)”,“po[[:alpha:]]{3}.exe” )

Page 20: Automatic Generation of Remediation Procedures for Malware Infections

20

System Details

Generating Concrete Remediation Procedures Infected Resources

Deleted Resources Not implemented

Page 21: Automatic Generation of Remediation Procedures for Malware Infections

21

Evaluation

Over 200 malicious programsExecute a sample 3 times in 5 different

environments to collect trace dataInfect 25 test environments which are all

distinct from those used to collect tracesExecute the generated remediation

procedureCompare the remediated state to the original

state

Page 22: Automatic Generation of Remediation Procedures for Malware Infections

22

Evaluation

Page 23: Automatic Generation of Remediation Procedures for Malware Infections

23

Evaluation

False positives One sample: very general regular expression

*.exe Future work

Context-free grammars

Page 24: Automatic Generation of Remediation Procedures for Malware Infections

24

Discussion

Limitation Finding all high-level malicious behaviors can not be

guaranteed. Specific environment is required Not enough generalizing traces

Evasion techniques

Page 25: Automatic Generation of Remediation Procedures for Malware Infections

25

Conclusion

Automatically generating malware remediation procedures

Dynamic analysisBehavior generalizationEffectively remediate many possible

executionsGood performanceLow false rate