2014
DOI: 10.1007/978-3-319-11379-1_2
|View full text |Cite
|
Sign up to set email alerts
|

GoldenEye: Efficiently and Effectively Unveiling Malware’s Targeted Environment

Abstract: Abstract. A critical challenge when combating malware threat is how to efficiently and effectively identify the targeted victim's environment, given an unknown malware sample. Unfortunately, existing malware analysis techniques either use a limited, fixed set of analysis environments (not effective) or employ expensive, time-consuming multi-path exploration (not efficient), making them not well-suited to solve this challenge. As such, this paper proposes a new dynamic analysis scheme to deal with this problem … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…Otherwise, the malware does not do anything harmful. In most cases, it terminates [78]. The following section summarises the two techniques GoldenEye [78] and VECG [79] for detecting the targeted environment of a malware.…”
Section: B Identifying Phantom Malware's Targeted Environmentmentioning
confidence: 99%
See 2 more Smart Citations
“…Otherwise, the malware does not do anything harmful. In most cases, it terminates [78]. The following section summarises the two techniques GoldenEye [78] and VECG [79] for detecting the targeted environment of a malware.…”
Section: B Identifying Phantom Malware's Targeted Environmentmentioning
confidence: 99%
“…In most cases, it terminates [78]. The following section summarises the two techniques GoldenEye [78] and VECG [79] for detecting the targeted environment of a malware. Further, it is discussed why these techniques failed to identify Phantom Malware's targeted environment.…”
Section: B Identifying Phantom Malware's Targeted Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…HARVESTER instruments the reporting mechanism for the values of interest into the slices (see line 4), making changes to the runtime environment (emulator, Android OS) unnecessary. Note that HARVESTER does not need to reconfigure or reset the actual device or emulator on which the slices are executed which is novel in comparison to other approaches that are based on symbolic or concolic execution [20], [21].…”
Section: Overall Approachmentioning
confidence: 99%
“…There is a vast literature on the problems of detecting [21,71,77], classifying [15,31,39,85] and eradicating botnets [91]. Detection challenges [12] include multiple administrative domains, Internet heterogeneity, botnets that are purely memory-resident [86] lack of ground truth, privacy concerns.…”
Section: Related Workmentioning
confidence: 99%