Загрузка страницы

Automated in-memory malware/rootkit detection via binary analysis and machine learning

CAMLIS 2018, Malachi Jones, PhD, MITRE
Automated in-memory malware/rootkit detection via binary analysis and machine learning (slides: https://www.camlis.org/malachi-jones/)

A prominent technique for detecting sophisticated malware consists of monitoring the execution behavior of each binary to identify anomalies and/or malicious intent. Hooking and emulation are two primary mechanisms that are employed to facilitate the monitoring. Although these behavioral monitoring mechanisms are a substantial improvement over classic signature detection, skilled malware authors have developed reliable techniques to defeat them. As an example, sophisticated malware can exploit hooking implementations by either utilizing alternative (e.g. lower level) unhooked API or by removing the hooks at run-time to evade monitoring. In addition, the malware can also perform checks to detect if it is executing in an emulator/VM and modify its behavior accordingly.

In this talk, we will demonstrate an approach for pairing Memory Forensics with Binary Analysis and Machine Learning to analyze the behavior of binaries on a set of hosts to detect advanced persistent threats (APT)s that may evade detection by hooking and traditional emulation. In particular, we will discuss how an approximate clustering algorithm with linear run-time performance can be leveraged to identify outliers (i.e. potential APTs) among sets of clustered memory artifacts (i.e. processes, shared libraries, drivers, and kernel modules). Note that these memory artifacts are collected from live, networked hosts and clustered real-time in a scalable manner. We will also discuss and demonstrate how dynamic binary analysis can be leveraged with Machine Learning techniques to differentiate between benign anomalous code and malware to improve detection accuracy.

Видео Automated in-memory malware/rootkit detection via binary analysis and machine learning канала CAMLIS
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
16 ноября 2018 г. 22:51:01
00:27:06
Другие видео канала
SQL Driven Infrastructure for Cybersecurity ML OperationsSQL Driven Infrastructure for Cybersecurity ML OperationsUsing Anomaly Detection on User Demographic Distributions to Identify Fake Account BurstsUsing Anomaly Detection on User Demographic Distributions to Identify Fake Account BurstsThreat Detection on Kubernetes Logs Using GNN EmbeddingsThreat Detection on Kubernetes Logs Using GNN EmbeddingsMalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and PackersMalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and PackersMinimizing Compute Costs: When When Should We Run More Expensive Malware Analysis? (CAMLIS 2022)Minimizing Compute Costs: When When Should We Run More Expensive Malware Analysis? (CAMLIS 2022)An Effective Framework for Malware Detection and Classification using Feature PrioritizationAn Effective Framework for Malware Detection and Classification using Feature PrioritizationFASER: Binary Code Similarity Search through the use of Intermediate RepresentationsFASER: Binary Code Similarity Search through the use of Intermediate RepresentationsActivation Analysis of a Byte-based Deep Neural Network for Malware ClassificationActivation Analysis of a Byte-based Deep Neural Network for Malware ClassificationLLM Prompt Injection: Attacks and DefensesLLM Prompt Injection: Attacks and DefensesExploring Backdoor Poisoning Attacks Against Malware ClassifiersExploring Backdoor Poisoning Attacks Against Malware ClassifiersCompilation as a Defense: Enhancing DL Model Attack Robustness via Tensor OptimizationCompilation as a Defense: Enhancing DL Model Attack Robustness via Tensor OptimizationA feature presentation: semi-supervised learning of file representationsA feature presentation: semi-supervised learning of file representationsPlaying Cat and Mouse with the Attacker: Frequent Item Set Mining in the Registry (CAMLIS 2022)Playing Cat and Mouse with the Attacker: Frequent Item Set Mining in the Registry (CAMLIS 2022)Keynote: Lessons Learned in Red Teaming AI Systems in High-Stakes Environments (CAMLIS 2022)Keynote: Lessons Learned in Red Teaming AI Systems in High-Stakes Environments (CAMLIS 2022)Next Generation Process Emulation with BineeNext Generation Process Emulation with BineeDescribing Malware via TaggingDescribing Malware via TaggingEMBER ImprovementsEMBER ImprovementsProblemChild: Discovering Anomalous Patterns based on Parent-Child Process RelationshipsProblemChild: Discovering Anomalous Patterns based on Parent-Child Process RelationshipsPlaying Defense: Benchmarking Cybersecurity Capabilities of Large Language ModelsPlaying Defense: Benchmarking Cybersecurity Capabilities of Large Language ModelsInroads in Autonomous Network Defence using Explained Reinforcement Learning (CAMLIS 2022)Inroads in Autonomous Network Defence using Explained Reinforcement Learning (CAMLIS 2022)Keynote - Lessons for AI Security PreparednessKeynote - Lessons for AI Security Preparedness
Яндекс.Метрика