You are on page 1of 13

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/269399065

A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

Article · January 2013

CITATIONS READS

4 2,942

5 authors, including:

Aparna Verma Wilson Jeberson


Sam Higginbottom University of Agriculture, Technology and Sciences Sam Higginbottom University of Agriculture, Technology and Sciences
1 PUBLICATION   4 CITATIONS    25 PUBLICATIONS   34 CITATIONS   

SEE PROFILE SEE PROFILE

Vrijendra Singh
Indian Institute of Information Technology Allahabad
42 PUBLICATIONS   217 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Software Development Effort Estimation View project

Software Re-engineering View project

All content following this page was uploaded by Wilson Jeberson on 16 October 2015.

The user has requested enhancement of the downloaded file.


Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS


Aparna Verma1, M.S.Rao2, A.K.Gupta3, W. Jeberson4, Vrijendra Singh5
IJCRR 1
Vol 05 issue 16 Central Forensic Science Laboratory, Hyderabad, A.P., India
2
Section: Technology Gujarat Forensic Science University, Gandhi Nagar, Gujarat, India
3
Category: Review Department of Forensic Science, SHIATS, Allahabad U.P., India
Received on: 10/07/13 4
Department of Computer Science and IT, SHIATS, Allahabad, U.P., India
Revised on: 03/08/13 5
Indian Institute of Information Technology, Allahabad, U.P., India
Accepted on: 24/08/13
E-mail of Corresponding Author: aparna_kri15@yahoo.co.in

ABSTRACT
Malwares are nasty software’s. It is designed to damage computer systems without the knowledge of
the owner using the system and technique advancements are posing big challenges for researchers in
both academia and the industry. The purpose of this study is to examine the available literatures on
malware analysis and to determine how research has evolved and advanced in terms of quantity,
content and publication outlets. Most malware programs are large and complex and one can’t possibly
understand every detail. Educating the internet users about malware attack, as well as the
implementation and proper application of anti-malware tools, are critical steps in protecting the
identities of online consumers against malware attacks.
Keywords: Malware, Internet, malware attack, forensic analysis, anti-malware tools

INTRODUCTION 4) (Aycock, 2006) defined malware as “software


Malware is a general term that encompasses whose intent is malicious, or whose effect is
viruses, Trojans, spywares and other invasive code malicious”.
is widespread today. Malware analysis is a multi- 5) The term “malware” here is being used as the
step process providing insight into malware generic name for the class of code that is
structure and functionality, facilitating the malicious, including viruses, trojans, worms, and
expansion of remedy. spyware. Malware authors use generators,
According to researcher incorporate libraries, and borrow code from
1) (Christodorescu et al., 2005) described a others—there exists a robust network for
malware instance as a program whose objective is exchange, and some malware authors take time to
malevolent. read and understand prior approaches by (Arief &
2) (McGraw and Morrisett,2000) defined Besnard ,2003.)
malicious code as “any code added, changed, or 6) (Fred Cohen's) original definition of a computer
removed from a software system in order to virus as of 1983 was: "a program that can 'infect'
intentionally cause harm or subvert the intended other programs by modifying them to include a
function of the system.” possibly evolved copy of itself." He updated this
3) The description given by (Vasudevan and definition a year later in 1984 in his paper entitled:
Yerraballi, 2006) which described malware as “a "Computer Viruses – Theories and Experiments”.
generic term that encompasses viruses, trojans, 7) According to BBC News online, 2004 malware
spywares and other intrusive code.” is a general term for a piece of software inserted
into an information system to cause harm to that

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 71
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

system or other systems, or to subvert them for use throughout the execution of a program (Chess et
other than that intended by their owners. al., 2007).
8) (Skoudis and Zeltser, 2003) Malware is a set of (Skoudis, 2004) outlined a model where analysis
instructions that run on your computer and make tools are distributed on a local victim machine and
your system do something that an attacker wants it on an external machine, to capture behavioral
to do. aspects of the malware on the local machine and
The term computer virus was first used in a its interaction with external services over a
science fiction novel by (Gerrold, 1972), which network. External services as outlined by (Arnold
includes a description of a fictional computer et al., 2000) can be setup on the external
program called virus and was able to self-replicate. monitoring segment.
The first academic use of the term was claimed by (Rieck et al.) experimented with different
(Cohen, 1983). The first published account of the heterogeneous test data collected over several
term can be found a year later by (Cohen, 1984) in months using honeypots demonstrated the
his paper Experiments with Computer Viruses. effectiveness of the method, especially in
Though Cohen first used the term, some early detecting novel instances of malware families
accounts of viruses can be found. According to previously not recognized by commercial anti-
(Ferbrache, 1992), the first reported incidents of virus software.
true viruses were in 1981 and 1982 on the Apple II A number of analysis tools are utilized by malware
computer. Elk Cloner is considered to be the first forensic analysts, with static and dynamic analysis
documented example of a virus in mid-1981. The representing two significant methodologies that
first PC virus was a boot sector virus called Brain can be used to analyse malware (Aquilina et al.,
in 1986, (Hoffman, 1990). Worm also owes their 2008). Software disassemblers and debuggers such
existence to science fiction literature. (Brunner’s, as IDA Pro (Hex-Rays, 2008) and OllyDBg
1975) Shockwave Rider introduced us to worm, a (Yuschusk, 2008) can be used to perform a
program that propagates itself on a computer detailed analysis of the malware code and provide
network. (Shoch, 1982) claimed the first use of the an internal view of the malwares functionality
term in academic circles. (Valli & Brand, 2008). This is referred to as static
Much has been written about viruses, worms, analysis.
trojans and other malwares since then, but now we In contrast, dynamic analysis runs the malware
shift our focus, from fiction to the real world and observes the interaction of the running
where both malware and anti-malware are big malware with the computer from a behavioural
commercial industries now (Gutmann, 2007). point of view. A number of plug-ins that extend
the functionality of IDA Pro and OllyDBg include
MALWARE ANALYSIS IDA Stealth (Newger, 2008) and Olly Advanced
Malware analysis is a multi-step process providing (MaRKuS, 2006) respectively to work with
insight into malware structure and functionality. malicious code that employ anti-analysis
Behavior monitoring, an important step in the techniques. The intention of such plug-ins is to
analysis process, is used to observe malware provide functionality to hide their associated tools.
relations with respect to the system and is Extensive literature exists on static analysis of
achieved by employing dynamic coarse-grained malicious binaries, e.g. (Christodorescu et al.,
binary-instrumentation on the target system. Initial 2005; Kirda et.al, 2006; Kruegel et.al, 2004).
examination of collected malware is called Moreover, recent work of (Moser et al., 2007)
profiling, (Aquilina et al., 2008).Dataflow analysis presents obfuscation techniques that are provably
examines the way data is moved and changed NP-hard for static analysis. Dynamic malware

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 72
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

analysis techniques have previously focused on In a similar approach (Sekar et al. 2001) used
obtaining reliable and accurate information on Finite State Automata (FSA) to represent system
execution of malicious programs (Bayer et al., call sequences. Similarly (Ko et al., 1997)
2006; Moser et al., 2007; Willems et al., 2007). proposed an idea of trace policy which was
Two techniques for behavior-based malware essentially a sequence of system calls in time
analysis using clustering of behavior reports have (Masri et al,. 2005) presented a tool called
been recently proposed (Lee et al., 2006; Bailey et Dynamic Information Flow Analysis (DIFA) to
al., 2007). (Moser et al., 2007) proposed a system monitor method calls at runtime for Java
that dynamically monitors a suspicious program to applications (Sekar et al., 1999) created a system
identify the execution points where the application call detection engine that compares system calls
makes control flow decisions based on input- modeled previously with the system calls made at
dependent values. runtime.
Static Anomaly Detection Hybrid Misuse Detection
(Wagner, 2011) proposed a technique that created (Mori, 2004) presented an approach to detect
a control flow graph (CFG) for a program encrypted and polymorphic viruses using static
representing its system call trace. At execution analysis and code emulation.
time this CFG was compared with the system call Dynamic Misuse Detection
sequences to check for any violation. (Debbabi, 2001) proposed a dynamic monitoring
Hybrid Anomaly Detection system that enforces a security policy. The
(Rabek, 2003) proposed an anomaly based approach was implemented in a system called
technique where static analysis was assisted by DaMon. Schneider 1998 presented enforceable
dynamic analysis to detect injected, dynamically security policies in the form of Finite State
generated and obfuscated code. Within the Automata.
program static analysis was used to identify the (Vasudevan et al.) have developed a new dynamic
location of system calls. The programs can be coarse-grained binary-instrumentation framework
dynamically monitored later to verify that each codenamed SPiKE, that aids in the construction of
realistic system call is made from the same powerful malware analysis tools to combat
location well-known using the static analysis. malware that are becoming increasingly hard to
Static Misuse Detection analyze. Goal is to present a binary-
(Bergeron et al., 1999) used a static misuse instrumentation framework that is unremarkable,
detection scheme where they used program slicing moveable, capable, easy-to-use and reusable,
to extract program regions that are critical from a supporting multithreading and SM-SC code, both
security point of view. in user- and kernel-mode.
In a related work (Bergeron et al., 2001) extracted (Valli et al.) laid an establishment for a Malware
an API call graph instead of the program slices to Analysis Body of Knowledge (MABOK) which is
test against the security policy. (Lo et al., 1995) required to analyse the malware forensically. This
proposed the idea of tell-tale signs which were body of knowledge has been the outcome of
heuristic signatures of malicious program. several years of study into malware categorization.
Dynamic Anomaly Detection Debuggers such as OllyDbg (Yuschuk, 2008) and
(Hofmeyr et al., 1998) proposed anomaly IDA Pro (Hex-Rays, 2008) are commonly used for
detection based upon sequence of system calls. A the analysis of malware. Plugins such as Olly
normal profile was composed of short sequence of Advanced (MaRKuS, 2006) for OllyDbg and IDA
system calls. Stealth (Newger, 2008) for IDA Pro focus on

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 73
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

hiding the presence of the tool from the software executes which one of the most important aspects
under investigation, in an effort to avoid detection. of the system is making it more difficult for the
(Christodorescu et al.) presented a unique malicious code to be detected.This tool runs the
viewpoint on malicious code detection. Attacker binaries in unchanged Windows environment
who writes the malicious code tries to conceal the making it accurate. Therefore these factors make
malicious code to threaten the malicious code TTAnalyze a perfect tool for quickly getting an
detectors such as Anti- virus software. accepting of the behavior of an unknown malware.
(Bayer et al.) presented TTAnalyze, a tool for A summarized list of the analysis tools
dynamically analyzing the behavior of Windows recommended by (Skoudis, 2004) as well as their
executables. Binary is run in an emulated purpose and analysis type, is shown in Table 1 in
operating system environment and the actions are the following page.
monitored. It does not modify the program it

Table 1- Summary of malware analysis tools showing analysis type, purpose and name of
commonly used tool name.
Analysis Type Purpose Tools
Use as many antivirus detection engines as possible Virus Total (Virus Total, 2008)
Static to assist classification.
Search the body of the malware for strings. Strings (Microsoft, 2008c)

File integrity check to record baseline configuration. Winalysis (Winalysis.com, 2008)


File monitoring. Find which tools are opening, Filemon (Microsoft, 2008c)
reading and writing files.
Process monitoring. Determine resources that are Process explorer (Microsoft, 2008c)
Dynamic being used such as DLL’s and registry keys.
Network monitoring. Uncover which ports are open, Fport (Foundstone, 2008), tcpview
collect network traffic and find vulnerabilities. (Microsoft, 2008c), nessus (Tenable
Network Security, 2008), nmap
(Insecure.org, 2008), wireshark (Combs,
2008), and snort (Sourcefire, 2008).
Registry monitoring. Monitor registry activities as Regmon (Microsoft, 2008c)
they occur.
Code Disassembly, debugging IDA Pro
OllyDbg (Yuschuk, 2008)

MALWARE ANALYSIS IN VIRTUAL a solution to protect applications' data even in the


MACHINE presence of a compromised operating system.
(Garfnkel et al., 2003) were the first to propose to More recently, Vasudevan et al. presented
use a VMM to perform OS-aware introspection, XTREC, a lightweight framework to record
and subsequently the idea was further elaborated. securely the execution control flow of all code
Other researchers instead proposed to use a VMM running in an untrusted system.
to protect the guest OS from attacks by (Sharif et al., 2009) introduced a framework that
supervising its execution, both with a software allows in-VM" monitoring and detection. Those
based VMM and by leveraging hardware support who employ virtual machine introspection
for virtualization. Similar ideas were also techniques to isolate security tools from the
suggested by other authors. (Chen et al.) proposed

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 74
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

unprocessed environment are very efficient, but (International Secure Systems Lab, Vienna
they are also expensive. University of Technology, Eurecom France, & UC
(Kolbitsch et al.) described a technique for Santa Barbara, 2008) have limitations (Bayer,
efficient and effective malware detection. Their 2009), such as the virtual machines in which the
idea is to build models of the malicious samples dynamic analysis is being conducted being
offline, and then to verify at run-time if the detected (Innes et al., 2006; Smith et al., 2006) A
behavior of a suspicious application adheres to a series of articles by (Hudak, 2009a, 2009b)
known model. (Martignoni et al.) used hierarchical provided an introduction to automating malware
behavior specifications to build a model of a analysis that can be further customized and
malicious program. As the number of malicious extended by using additional tools and scripts.
samples keeps growing, efficiency is essential not A range of techniques exist to detect that the
only for detectors, but also for automatic malware malware is running inside a virtual machine such
analysis systems. To address this problem, (Bayer as VMware or Virtual PC (Innes et al., 2006;
et al., 2010) proposed a technique that allows to Smithet al., 2006). The use of these techniques can
detect if a binary is a polymorphic variation of a be detected and mitigated (Eagle, 2004). The
malware sample that has already been analyzed in general methodology presented by Zeltser (2007)
the past. is as follows:
1. Run the malware in an isolated laboratory.
ANTI ONLINE ANALYSIS ENGINE 2. Monitor the interaction between the system and
1) Anubis (International Secure Systems Lab, network from a behavioural sense.
Vienna University of Technology, Eurecom 3. Understand’s the program code.
France, & UC Santa Barbara, 2008) is an online 4. Repeat the process until enough information is
malware behavioral analysis service. gathered.
2) Sandboxie (Sandboxie, 2008) is an application However, malware can use techniques to
where suspicious programs can be run in an determine if it is running in a virtual machine as
environment that uses a transient storage area, demonstrated by the logic of the following pseudo
known as a sand box, so that data is not written to code reproduced from a presentation by (Smith et
the hard drive. This allows the analyst to observe al., 2006) as shown:
what an unknown program is going to do. IF detect_vmware
3) Norman Sandbox (Norman, 2008) also provides THEN do nothing, destroy self, destroy system
an online service to analyze malware, but this also ELSE
can be detected.( Krack ,2006) notes that the Continue with malware payload
presence of the sandbox can be detected by Eagle, reported that VMware uses a registry key
“reading it’s memory, and comparing it to that of a for the installation location of VMware as:
standard computer”. HKLM\Software\VMware,Inc.\VMwareTools\Inst
The detection performance of AV software has allPath
been shown by a number of researchers to be far Malware can identify the key to point out that it
less than ideal (Rutkowska, 2006; Yan et al., 2008; could be running in a virtual machine. Another
Yinnet al., 2007; Zhou et al., 2008). technique Eagle points out, is to use the Windows
Online analysis engines are offered that can give Management Instrumentation (WMI) to iterate
very valuable reports such as detected virus though the network interfaces to see if any of the
signatures, network activities, file activities, MAC addresses used belongs to VMware. Eagle
service activities, registry activities and process suggests the following to mitigate this technique:
activities. Online analysis engines such as Anubis • Uninstall VMware tools.

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 75
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

• Change the MAC address of the virtual adapter To deter digital forensic examination a number of
in the guest OS. lessons learned from the techniques employed for
(Porras et al., 2007) noted that recent versions of the malicious executable software during
Storm appear to have stopped checking to see if it investigation. Detection of malware signature has
is running inside a virtual machine and is instead been recognized by researchers to be far less than
focusing on hiding themselves from monitoring ideal. Thus to manually analyse the suspicious
software. files there’s a requirement of forensic analyst. To
avoid detection & hide its true intent, the attacker
ANALYSIS AVOIDANCE make use of packers, protectors or cryptors to
Malicious software (malware) has a wide range of obstruct the forensic analyst. Therefore the analyst
analysis avoidance techniques that it can employ must understand the limitations of tools, anti-
to hinder forensic analysis. Although Rolegal analysis techniques & how to employ proper
software can incorporate the same analysis analysis methodology to uncover the aim of the
avoidance techniques to provide a measure of malware (Brand et al).
protection against reverse engineering and to Modern malware incorporates stealth techniques
protect intellectual property, malware invariably to hide it from the analyst, deception techniques to
makes much greater use of such techniques to hide its true intent, and active techniques to defeat
make detailed analysis labour intensive and very common analysis tools in their default
time consuming. configurations (Grugq, 2003; Harbour, 2007;
(Brand et al.) suggested that the discovery of the Rutkowska, 2006a, 2006b). Such techniques are
intent of deception may be a very good indicator commonly referred to as anti-forensics and are
of an underlying malicious objective of the becoming a very important consideration for the
software under investigation. digital forensic analyst, as the majority of modern
A review of the literature on malware analysis malware employs these analysis avoidance
methodologies found that the most effective techniques (Falliere, 2007; Ferrie, 2008; Yason,
methodologies take the presence of analysis 2007). For the analysis of malicious network
avoidance techniques into account (Skoudis et al., honeypots is used which is a rising forensic tool.
2004; Zeltser, 2007). (Zeltser, 2007) presented an Generally research lab and security firm use
incremental, static and dynamic spiral analysis honeypots to capture new variant of malware.
methodology for analysing malware which (Kumar et al.) used honeypots for generating and
additionally moulds the analysis environment as propagating direct cures for unknown and new
understanding of the malware is attained. malware in a network in the form of on-the-fly
Software with a malicious intent may be antimalware signature which spread in a way
considered to be far more likely to employ anti- similar to the spread of malware in network. The
analysis techniques than legitimate software remarkable gain of implementing this technique is
(Vuksan et al., 2009), to the extent that, detection that for new malware which has not been
of the presence of anti-analysis techniques may discovered by researcher and security firm the
indicate the presence of malware (Wysopal, 2009). above proposed system would be capable of
providing an effective cures.
OUTCOMES AFTER AN INVESTIGATION
INTO THE ANALYSIS AVOIDANCE
TECHNIQUES OF MALICIOUS SOFTWARE

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 76
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

Table 2- A proposed taxonomy of techniques employed by malware in order to avoid analysis


technique is as follows:
Anti Emulation A range of techniques exist to detect that the malware is running inside popular VM‘s such as
VMware or Virtual PC.
Anti Online Analysis A variety of techniques exist for malware to determine if it is running in a specific online
analysis engine such as Anubis or Norman Sandbox.
Anti Hardware Techniques that target hardware such as the CPU including the debug registers to determine if
it is being debugged.
Anti Debugger Target the way debuggers work and take advantage of these to take control of the flow of
execution. This gives malware the opportunity to incorporate deception.
Anti Disassemblers Target the way disassemblers work and take advantage of this to produce a false disassembly.
Anti Tools Detect the presence of specific analysis tools and enter a deceptive mode.
Anti Memory Target the way memory is used when a process is being debugged and take advantage of this
as well as the way processes can be dumped from memory including the use of stolen bytes.
Anti process Target the way processes are handled when being debugged and take advantage of this
including structured exception handling.
Anti Analysis Target the way analysis is conducted. Use junk code, code camouflage, check sum checks,
destruction of the Import Address Table and other deceptive techniques to make analysis
harder.
Packers Use run time packers and protectors to obfuscate code and data and make it hard to unpack to
and find the original entry point. This includes packers that use their own virtual machines such as
Protectors HyperUnpackme2.
Rootkits Insert rootkits at Ring 0 to take control of the way the operating system manages processes and
use deception to hide malicious processes

METHODOLOGY “malware”, “malware analysis” have been used to


Based on suggestions given by various authors identify relevant thesis for the study.
(Reed, 1998; Webster et al., 2002; Green et al., For the second stage leading journals and
2006; Levy et al., 2006; Ma et al., 2006; Armitage international conference papers were selected as
et al., 2008) for writing a literature review paper, these have gone through scientific peer reviews in
the following steps were adopted to search the order to be accepted at journals or conference
sources for the review. proceedings.
The initial stage for the review covered doctoral The list of research papers (from serial number
thesis from various international universities 1-10) and thesis (from serial number 11-14)
because they have been reviewed at higher exams. included in the review and their classifications
Online library has been used as a source for all with respect to their topics and contributions
doctoral and master theses. Keywords such as have been summarized in Table 3.
S.No. Title Author Contribution
1 Survey on malware Vinod, Gaur The work focused on various malware detection methods like
detection methods signature based detection, reverse engineering of obfuscated code to
detect malicious nature.
2 Malware Forensics- Martin, Looked at what tricks, tools and techniques one can use to help
Detecting the Unknown Overton establish the true state of the suspect system. Focused on step by step
(2008) approach of what tools to use, what to look for & what to do with any
suspicious files.
3 A Threat to Cyber Brand, Valli, Paper presented a threat to cyber resilience in the form of a
Resilience: A malware Woodward conceptual model of a malware
Rebirthing Botnet. (2011) rebirthing botnet.
4 Lessons learned from an Brand, Valli, Analyst must understand the anti-analysis technique that can be

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 77
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

Investigation into the Woodward employed & how to mitigate them, the limitations of existing tools &
Analysis Avoidance (2011) how to employ an appropriate analysis methodology to uncover the
Techniques of intent of malware.
Malicious Software.
5 Malware Forensics: Brand, Valli, Suggested that the discovery of intent of deception may be a very
discovery of the intent Woodward good indicator of an underlying malicious objective of the software
of deception (2011) under investigation.
6 Detection & Kumar, Pant Proposed a system where honeypots used for generating &
Preservation of New & broadcasting instant cures for new & unknown malware in a
Unknown Malware network.
using Honeypots.
7 SPiKE: Engineering Vasudevan, Developed a new dynamic coarse grained binary instrumentation
Malware Analysis Yerraballi framework codenamed SPiKE that aids in the construction of
Tools using Unobtrusive powerful malware analysis tools to combat malware that are
Binary-Instrumentation becoming increasingly hard to analyse.
8. The Malware Analysis Valli, Brand Presented a foundation for a malware (MABOK) i.e, required to
Body of (2008) successfully forensically analyse malware.
Knowledge(MABOK)
9. Static analysis of Christodorescu, Presented an architecture for detecting malicious patterns in
executables to detect Jha (2003) executables that is resilient to common obfuscation transformations.
malicious patterns
10. TT Analyze: A tool for Bayer, Kruegel, Presented a tool TT analyzer for dynamically analyzing the behavior
analyzing malware. Kirda (2006) of windows executables.
11. Dealing with next Paleari (2011) Presented a new framework for improving behavior based analysis of
generation Malware. suspicious programs, that allows an end user to delegate security
labs, the execution and the analysis of a program and to force the
program to behave as if it were executed directly in the environment
of the former.
12. Robust & Efficient Sharif 1) Efficient Methods for enabling static malware analysis.
Malware Analysis and (2010) 2) Making dynamic analysis approaches more robust.
host based monitoring 3) Reversing emulator based obfuscation.
4) Anticipating obfuscations that hide trigger based behavior.
13. Analysis avoidance Brand Demonstrated anti analysis techniques can be very effective at
techniques of malicious (2010) hindering analysis by the tools typically used analysts.
software.
14. Data mining methods Siddiqui Presented a data mining framework to detect malicious programs.
For malware detection. (2008)

DISCUSSION CONCLUSIONS
From the review discussed so far remember that Forensic analysis of evidences and residual traces
malware analysis is like a cat and mouse game. of crimes is an ancient, tried and successful field
The findings reveal that there are two major in the realm of investigation. The latest inclusion
techniques available for malware analysis; also it in crime is with the advent of computers,
shows the defect of virtual machine, many communication and networking. The trend of
researchers are unable to detect malware because growth in malware attack is increasing more
malware has a wide range of analysis avoidance rapidly. Networks have become more vulnerable
techniques. As new malware analysis techniques and are under constant malware attacks. From a
are developed, malware authors respond with new lone system (PC) to an entire organization
techniques to thwart analysis therefore network, no one is inescapable from the current
detecting,analyzing and finally generating cures sabotage. Financial siphoning of bank a/c,
for them are themselves individual research topics. stalking, character assassination, duping are some

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 78
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

examples of malware attack (cyber crime). Owing http://www.ossir.org/paris/supports/2009/2009


to this fact, forensic digital analysis of such crimes -06-09/ANUBIS-OSSIR-EN-June-2009-
has gained immense importance in investigation of v1.1.00.pdf;2009.
late. 10. Bayer U, Kirda E, Kruegel C. Improving the
efficiency of dynamic malware analysis. In
ACKNOWLEDGEMENT Proceedings of the 25th Symposium on
The corresponding author is thankful to Applied Computing (SAC); Lusanne;
Directorate of Forensic Science Services for Switzerland; March 2010.
providing fellowship to pursue Research and 11. Bergeron J, Debbabi M, Erhioui M M, Ktari
development work in forensic science. B. “Static Analysis of Binary Code to Isolate
Malicious Behavior.” In Proceedings of the
REFERENCES 8th Workshop on Enabling Technologies on
1. Arief, B. & Besnard, D. (2003). Technical and Infrastructure for Collaborative Enterprises
human issues in computer-based systems (WETICE’99); 184–189; 1999.
security. University of Newcastle upon Tyne. 12. Bergeron J, Debbabi M, Desharnais J, Erhioui
(CS-TR-790). M M, Lavoie Y, Tawbi N. “Static Detection
2. Armitage, A. and Keeble-Allen, D. (2008), of Malicious Code in Executable Programs.”
“Undertaking a structured literature review or Symposium on Requirements Engineering for
structuring a literature review: tales from the Information Security (SREIS’01); 2001.
field”, The Electronic Journal of Business 13. Brand M, Valli C, Woodward A. A Threat to
Research Methods, Vol. 6 No. 2, pp. 103-14. cyber resilience: A malware rebirthing Botnet.
3. Akira Mori. “Detecting Unknown Computer In the Proceedings of the 2nd International
Viruses - A New Approach -.” Lecture Notes Cyber Resilience Conference; 2011
in Computer Science, pp. 226–241, 2004. 14. Brumley D, Hartwig C, Liang Z, Newsome
4. Aquilina J, Casey E., & Malin, C. Malware J, Song D, and Yin H. Towards automatically
Forensics Investigating and Analyzing identifying trigger-based behavior in malware
Malicious Code; Burlington; MA: Syngress; using symbolic execution and binary analysis.
2008. Technical Report CMU-CS-07-105; Carnegie
5. Aycock, J. (2006). Computer Viruses and Mellon University; 2007.
Malware. New York: Springer. 15. Chen X, Garfnkel T, Christopher E L,
6. Bailey M, Oberheide J, Andersen J, Mao M Subrahmanyam P, Waldspurger C A, Boneh
Z, Jahanian F, Nazario J. Automated D, Dwoskin J, Dan R. K. Ports. Overshadow:
classification and analysis of internet malware. a virtualization-based approach to retroftting
In Proceedings of the 10th Symposium on protection in commodity operating systems.
Recent Advances in Intrusion Detection Operating Systems Review, 42(2); 2008.
(RAID’07); 178–197; 2007. 16. Chess B, & West J. Secure Programming with
7. Bayer U, Kruegel C, Kirda E. TTAnalyze: A Static Analysis. Upper Saddle River; 2007.
tool for analyzing malware. In Proceedings of 17. Cohen F. “Experiments with Computer
EICAR; April 2006. Viruses;”1984.
8. Bayer U, Moser A, Kruegel C, Kirda E. 18. Chouchane M, Walenstein A, Lakhotia A.
Dynamic analysis of malicious code; Journal Statistical signatures for fast filtering of
in Computer Virology; 2:67–77; 2006. instruction-substituting metamorphic malware.
9. Bayer U. Anubis A platform the analysis of In Proceedings of the 2007 ACM workshop on
malicious code. Journal. Retrieved from Recurring malcode; 2007.

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 79
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

19. Christodorescu M, Jha S. Static analysis of “Intrusion detection via static analysis.” IEEE
executables to detect malicious patterns. In Symposium on Security and Privacy; 2001.
Proceedings of the 12th USENIX Security 30. Harbour N. Stealth Secrets of the Malware
Symposium; 12–12; 2003. Ninjas. Retrieved October 20, 2007 from
20. Christodorescu M, Jha S, Seshia A S, Song X https://www.blackhat.com/presentations/bh-
D, Bryant E R. Semantics aware malware usa-07/Harbour/Presentation/bh-usa-07
detection. In IEEE Symposium on Security and harbour.pdf;2007.
Privacy; 32–46; 2005. 31. Hoffman J L. Rogue Programs: Viruses,
21. Debbabi M, Girard M, Poulin L, Salois M, Worms, and Trojan Horses. Van Nostrand
Tawbi N. “Dynamic Monitoring of Malicious Reinhold; 1990.
Activity in Software Systems.” In Symposium 32. Hofmeyr S, Forrest S, Somayaji A. “Intrusion
on Requirements Engineering for Information detection using sequences of system calls.”
Security (SREIS’01); 2001. Journal of Computer Security; 151–180; 1998.
22. Falliere N. Windows Anti-Debug Reference. 33. Hudak T. Automating Malware Analysis.
Retrieved October 1, 2007 from Hakin9; 64-69; July 2009
http://www.securityfocus.com/infocus/1893;2 34. International Secure Systems Lab, Vienna
007 University of Technology, Eurecom France &
23. Ferbrache D. A Pathology of Computer UC Santa Barbara. (2008). Anubis: Analyzing
Viruses. Springer-Verlag, 1992 Unknown Binaries; Retrieved October 4,
24. Ferrie P. Anti-Unpacker Tricks. Paper 2008; from http://anubis.iseclab.org.
presented at the 2nd International Caro 35. Innes S, Valli C. Honeypots: How do you
Workshop. From http://www.datasecurity know when you are inside one? Paper
event.com/uploads/unpackers.pdf;2008 presented at the 4th Australian Digital
25. McGraw G, Morrisett G. Attacking malicious Forensics Conference; Edith Cowan
code: A report to the infosec research council University; Perth; Western Australia; 2006.
IEEE Software; 2000;33–44.26) Garfnkel T, 36. Jiang, Wang X .Out-of-the-Box" monitoring
Rosenblum M. A virtual machine of VMbased high-interaction honeypots. In
introspection based architecture for intrusion Proceedings of the International Symposium
detection. In Proceedings of the Symposium on Recent Advances in Intrusion Detection
on Network and Distributed Systems Security (RAID); 2007.
(NDSS); San Diego;CA; USA; February 2003 37. Kirda E, Kruegel C, Banks G, Vigna G,
26. Gerrold D. When Harlie Was One. Doubleday; Kemmerer A R. Behavior-based spyware
1972. detection. In Proceedings of the 15th USENIX
27. Green, B.N., Johnson, C.D. and Adams, A. Security Symposium; 2006; 19–19.
(2006), “Writing narrative literature reviews 38. Ko C, Ruschitzka M, and Levitt K. “Execution
for peer-reviewed journals: secrets of the Monitoring of Security-Critical Programs in
trade”, Journal of Chiropractic Medicine, Vol. Distributed Systems: A Specification-Based
5 No. 3, 101-17. Approach. In Proceedings of the 1997 IEEE
28. Grugq .The Art of Defiling, Defeating Symposium on Security and Privacy; 1997.
Forensic Analysis on UNIX File Systems. 39. Krack. Defeating Norman Sandbox. Retrieved
Paper presented at the Black Hat Asia ;2003; July 21, 2006 from
Singapore. http://www.ryan1918.com/viewtopic.php?t=26
29. Gutmann P. “The Commercial Malware 76&highlight=defeat;2006.
Industry.”, 2007. D.Wagner and D. Dean.

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 80
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

40. Kruegel C, Robertson W, and Vigna G. Security and Privacy; 2008 May; Oakland;
Detecting kernel-level rootkits through binary CA.
analysis. In Proceedings of the 20th Annual 50. Perrig A, Gligor V, and Vasudevan A.
Computer Security Applications Conference XTREC: secure realtime execution trace
(ACSAC); 2004. recording and analysis on commodity
41. Lee T , Mody J J. Behavioral classification. In platforms; Technical report, Carnegie Mellon
Proceedings of EICAR; April 2006. University; 2010.
42. Levy, Y. and Ellis, T.J. (2006), “A systems 51. Porras P, Saidi H, Yegneswaran V. A Multi-
approach to conduct an effective literature perspective Analysis of the Storm (Peacomm)
review insupport of information systems Worm. Retrieved Dec 7, 2007 from
research”, Informing Science Journal, Vol. 9, http://www.cyber ta.org/ pubs/ StormWorm/
181-212. SRITechnical-Report-10-01-Storm-
43. Masood S G. Malware Analysis for Analysis.pdf
Administrators. Retrieved 17 March, 2007 52. Rabek C J, Khazan I R, Lewandowski M S,
from Cunningham K R. “Detection of Injected,
http://www.securityfocus.com/infocus/1780;2 Dynamically Generated, and Obfuscated
004. Malicious Code.” In Proceedings of the 2003
44. Masri W, Podgurski A. “Using Dynamic ACM Workshop on Rapid Malcode; 76–82;
Information Flow Analysis to Detect Against 2003.
Applications.” In Proceedings of the 2005 53. Raymond W Lo, Karl N Levitt, Ronald A
Workshop on Software Engineering for secure Olsson. “MCF: A Malicious Code Filter.”
sytems Building Trustworthy Computers and Security; 541–566; 1995.
Applications;2005. 54. Reed, L.E. (1998), “Performing a literature
45. Moser A, Kruegel C, and Kirda E.Limits of review”, 28th Annual Frontiers in Education
static analysis for malware detection. In Conference, FIE’98, Vol. 1, pp. 380-3.
Proceedings of the 23rd Annual Computer 55. Riley R, Jiang X, Xu D. Guest-transparent
Security Applications Conference (ACSAC); prevention of kernel rootkits with VMM-based
2007. memory shadowing. In Proceedings of the
46. Moser A , Kruegel C, and Kirda E. Exploring 11th International Symposium on Recent
multiple execution paths for malware analysis. Advances in Intrusion Detection; 2008.
In Proceedings of 2007 IEEE Symposium on 56. Rutkowska J. (2006). Introducing Stealth
Security and Privacy; 2007; Oakland, CA. Malware Taxonomy. Retrieved April 12; 2009
47. Norman. Submit file for Sandbox analysis. from
Retrieved April 12; 2008;from http://www.invisiblethings.org/papers/malwar
http://www.norman.com/microsites/nsic/Subm e-taxonomy.pdf.
it/en-us 57. Rutkowska J. (2006a). Fighting Stealth
48. Overton M .Malware Forensics: Detecting the Malware - Towards Verifiable OSes. Journal.
unknown. Paper presented in Virus Bulletin Retrieved from
Conference at the Westin Hotel;Ottawa; http://www.invisiblethings.org/papers/towards
Canada;October 1st-3rd 2008. _verifiable_systems.ppt
49. Payne B D, Carbone M, Sharif M, and Lee W. 58. Rutkowska J. (2006b). Introducing Stealth
Lares: An architecture for secure active Malware Taxonomy. Journal. Retrieved from
monitoring using virtualization. In http://www.invisiblethings.org/papers/malware-
Proceedings of the IEEE Symposium on taxonomy.pdf

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 81
Aparna Verma et al A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS

59. Sandboxie (2008).About Sandboxie. Retrieved 70. Vinod P, Laxmi V, Gaur M S. Survey on
April 12, 2008, from http://www.sandboxie.com. Malware Detection Methods.
60. Schneider F. “Enforceable Security Policies.” 71. Virus Total (2008). Virus Total. Retrieved
Technical report; 1998. October 4, 2008, from
61. Sekar R, T. Bowen and M. Segal. “On http://www.virustotal.com/en/virustotalf.html
Preventing Intrusions by Process Behavior 72. Vuksan M., Peričin T, Milunovic V. Fast &
Monitoring.” In USENIX Intrusion Detection Furious Reverse Engineering with TitanEngine.
Workshop, 1999. Black Hat USA 2009, from
62. Sekar R, Bendre M, Bollineni P, Dhurjati D. “A http://www.reversinglabs.com/blackhat/TitanEn
Fast Automaton-Based Approach for Detecting gine_BlackHat-USA-09-Slides.pdf;2009.
Anomalous Program Behaviors.” In IEEE 73. Webster, J. and Watson, R.T. (2002),
Symposium on Security and Privacy; 2001. “Analyzing the past to prepare for the future:
63. Seshadri A, Luk M, Qu N, and Perrig A. writing
SecVisor: A tiny hypervisor to provide lifetime 74. a literature review”, MIS Quarterly, Vol. 26 No.
kernel code integrity for commodity OSes. In 2.69)Willems C, Holz T, and Freiling F.
Proceedings of the ACM Symposium on CWSandbox: Towards automated dynamic
Operating Systems Principles.ACM, 2007. binary analysis. IEEE Security and Privacy;
64. Sharif M, Lee W, Cui W, Lanzi A. Secure in 2007.
vm monitoring using hardware virtualization. In 75. Wysopal C. Good Obfuscation, Bad Code.
Proceedings of the ACM Conference on Retrieved May 03 2009, from
Computer and Communications Security (CCS); http://www.securityfocus.com/columnists/498?r
2009. ef=oc; 2009.
65. Shoch F J , Hupp A J. “The Worm Program- 76. Yan W, Zhang Z, Ansari N. Revealing Packed
Early Experience with a Distributed Malware. IEEE Security and Privacy 6 (5); 65-
Computation.”;172–180; 1982. 69; 2008.
66. Skoudis E, Zeltser L . Malware Fighting 77. Yason M. The Art of Unpacking. Retrieved Feb
Malicious Code. New Jersey: Prentice Hall; 12, 2008 from
2004. https://www.blackhat.com/presentations/bh-usa-
67. Smith S, Quist D (2006). Hacking Malware: 07/Yason/Whitepaper/bh-usa-07-yason-WP.pdf;
Offense is the new Defense. Retrieved July 24, 2007.
2007 from http:// www. offensivecomputing.net 78. Yin H, Song D, Egele M, Kruegel C, Kirda E .
/dc14/ valsmith_ dquist_ hacking_ malware_ Panorama: capturing system-wide information
us06.pdf. flow for malware detection and analysis. Paper
68. Szor P. The Art of Computer Virus Research and presented at the Proceedings of the 14th ACM
Defense. Addison-Wesley; 2005. conference on Computer and communications
69. Valli C, Brand M. Malware Analysis Body of security; 2007.
Knowledge. Paper presented at the 6th 79. Zeltser L. Reverse Engineering Malware: Tools
Australian Digital Forensics Conference; Edith and Techniques Hands-On. Bethesda: SANS
Cowan University; Mount Lawley Campus; Institute; 2007.
Western Australia; 2008. 80. Zhou Y, Meador I W. Malware detection using
Vasudevan and R. Yerraballi. Spike: adaptive data compression. Paper presented at
Engineering malware analysis tools using the Proceedings of the 1st ACM workshop on
unobtrusive binary-instrumentation. In Workshop on AISec; 2008.
Proceedings of the 29th Australasian Computer
Science Conference, pages 311–320, 2006.

Int J Cur Res Rev, Aug 2013/ Vol 05 (16)


Page 82

View publication stats

You might also like