The user action event generator design for leading malicious behaviors from malware in sandbox

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

The number of malwares has been consistently growing for several years and the working platform of them was diversified. To analyze these malwares, an analyst uses automated investigation tools as sandbox. However, current malwares apply the various techniques to avoid the detection of the sandbox. Especially, it is hard to be analyzed when the malicious behavior is triggered by user events. In this paper, we propose methods to enter malicious behavior routine in the sample malware codes, which is happened during the virtual execution in the sandbox in order to perform the analysis of malware. We design the methods as the user action event generator using fuzzing. The malicious behaviors triggered by the generator are exported to the sandbox report as API list. We show the result of the event generator.

Cite

CITATION STYLE

APA

Joo, J. U., Shin, I., Hwang, T. W., & Kim, M. (2015). The user action event generator design for leading malicious behaviors from malware in sandbox. International Journal of Security and Its Applications, 9(10), 165–176. https://doi.org/10.14257/ijsia.2015.9.10.15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free