Empirical study to fingerprint public malware analysis services

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The evolution of malicious software (malware) analysis tools provided controlled, isolated, and virtual environments to analyze malware samples. Several services are found on the Internet that provide to users automatic system to analyze malware samples, as VirusTotal, Jotti, or ClamAV, to name a few. Unfortunately, malware is currently incorporating techniques to recognize execution onto a virtual or sandbox environment. When analysis environment is detected, malware behave as a benign application or even show no activity. In this work, we present an empirical study and characterization of automatic public malware analysis services. In particular, we consider 26 different services. We also show a set of features that allow to easily fingerprint these services as analysis environments. Finally, we propose a method to mitigate fingerprinting.

Cite

CITATION STYLE

APA

Botas, Á., Rodríguez, R. J., Matellán, V., & García, J. F. (2018). Empirical study to fingerprint public malware analysis services. In Advances in Intelligent Systems and Computing (Vol. 649, pp. 589–599). Springer Verlag. https://doi.org/10.1007/978-3-319-67180-2_57

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free