Embodiments of the disclosure relate to the field of network security. More specifically, one embodiment of the disclosure relates to a system, apparatus and method for determining the presence of malware within a binary object.
Over the last decade, malicious software (malware) has become a pervasive problem for Internet users. In some situations, malware is a program or file that is embedded within downloadable content and designed to adversely influence (i.e. attack) normal operations of a computer. Examples of different types of malware may include bots, computer viruses, worms, Trojan horses, spyware, adware, or any other programming that operates within the computer without permission.
For instance, content may be embedded with objects associated with a web page hosted by a malicious web site. By downloading this content, malware causing another web page to be requested from a malicious web site may be unknowingly installed on the computer. Similarly, malware may also be installed on a computer upon receipt or opening of an electronic mail (email) message. For example, an email message may contain an attachment, such as a Portable Document Format (PDF) document, with embedded executable malware. Also, malware may exist in files infected through any of a variety of attack vectors, which are uploaded from the infected computer onto a networked storage device such as a file share.
Over the past few years, various types of security methods have been deployed that have attempted to find malware within files or other network content. Often, these methods compare a segment of code to a previously known segment that has already been determined to be malicious. While sometimes effective, these methods are often “brittle,” meaning that changes, even very slight changes to the code may not yield a match and thus become a false negative result, allowing a system to become vulnerable to the changed code. These changes to codes may be done on purpose by the malware creators to evade detection, or they may be the result of changes in the tools used to create the malware. In other cases, even slight changes by the malware creators, including updating their compiler programs, may alter the final malware code just enough to evade detection by brittle systems.
Embodiments of the invention are illustrated by way of example and not by way of limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
Various embodiments of the disclosure relate to a process configured to generate and analyze a symbolic function (“symfunc”) hash from a given piece of binary code. In general, the generation of the symfunc hash value is compared against previously logged symfunc hash values to associate the potential behaviors of a newly generated symfunc hash value to those previously generated, stored, and/or documented. Based on this method, the detection of malware in accordance with the invention avoids being “brittle,” thereby making the detection technique less susceptible to evasion techniques such as modification of the malware code. This process can be accomplished through a series of data processing steps that can be accomplished within a malware content detection (“MCD”) system.
One feature of the present invention is to generate an abstraction of a suspected binary object that can be compared to other abstractions of potentially related binary objects. The abstraction process can be accomplished in such a way that reliable information about the suspected binary object can be determined. This process can be enhanced by filtering non-differentiating features from the generated abstraction such that unique and/or differentiating features can be more easily determined and compared against similarly abstracted objects. This abstraction may be improved by analyzing and abstracting the suspected binary objects based on the contained functions and corresponding calls to and from the object, as well as examining various reads and writes to memory. In this way, small changes in the suspected binary object may be abstracted out of the final hash value used for comparison against other previously analyzed binary objects.
More specifically, the MCD system can be configured to receive a plurality of binary code samples for analysis, which are then disassembled into various opcodes or other disassembled code data. The opcodes, or other disassembled code, may then be processed by the MCD to be further abstracted into a symbolic representation as a list of short equations (“symboliks”). The symboliks may then be further abstracted into a symfunc object by the MCD. In order to reduce an amount of time needed for processing and/or analysis, the symfunc object undergoes a hash operation through a specific and repeated heuristic method to generate a manageable symfunc hash value.
After the generation, the symfunc hash value may be compared to a collection of previously generated symfunc hash values, related to previously detected malware, to associate known characteristics of a code family to the symfunc hash values generated from the binary code sample. Thus, characteristics of the binary code sample can be determined from the comparison of the symfunc hash value generated from the process outlined in the instant application. These determined characteristics can include whether the binary code sample contains malicious code including, but not limited to, keylogging, worms, trojan horses, and/or viruses.
According to one embodiment of the disclosure, previously generated symfunc hash values can be stored within a single central data store or database and utilized for comparison either on a front-line appliance, or remotely as a service. Each symfunc has data associated with its corresponding binary object that was used to generate the symfunc hash. The entire symfunc hash data store can be over one terabyte in size, and be publicly available, internally up kept, or publicly available while supplemented with private data.
Known symfunc hash values can be utilized to group binary objects associated with the known symfunc hash values to code family groups. These code families can be utilized to more easily determine the source of a malicious binary object. Code families are typically grouped by human analysts based on similar “fingerprints” or structure of code including, but not limited to, morphology, targets and methods of attack. One aspect of the present invention is to automatically generate associations of binary objects to code families based on matches found in a symfunc database. In this way, a faster determination of the source of a malicious binary object (from a hostile nation state, etc.) is possible.
In the following description, certain terminology is used to describe features of the invention. For example, in certain situations, the terms “logic” and “engine” are representative of hardware, firmware or software that is configured to perform one or more functions. As hardware, logic may include circuitry such as processing circuitry (e.g., a microprocessor, one or more processor cores, a programmable gate array, a microcontroller, an application specific integrated circuit, etc.), wireless receiver, transmitter and/or transceiver circuitry, semiconductor memory, combinatorial logic, or other types of electronic components.
Alternatively, or in combination with the hardware circuitry described above, the logic (or engine) may be software in the form of one or more software modules. The software modules may include an executable application, a daemon application, an application programming interface (API), a subroutine, a function, a procedure, an applet, a servlet, a routine, source code, a shared library/dynamic load library, or even one or more instructions. The software module(s) may be stored in any type of a suitable non-transitory storage medium, or transitory storage medium (e.g., electrical, optical, acoustical or other form of propagated signals such as carrier waves, infrared signals, or digital signals). Examples of non-transitory storage medium may include, but are not limited or restricted to a programmable circuit; a semiconductor memory; non-persistent storage such as volatile memory (e.g., any type of random access memory “RAM”); persistent storage such as non-volatile memory (e.g., read-only memory “ROM”, power-backed RAM, flash memory, phase-change memory, etc.), a solid-state drive, hard disk drive, an optical disc drive, or a portable memory device. As firmware, the executable code may be stored in persistent storage.
The term “network content” generally refers to information transmitted over a network, proprietary or public (e.g. the Internet). The network content may present as one or more messages, namely a grouping of information that comprises a header and a payload, such as any of the following: a packet; a frame; a stream being a sequence of packets or frames; an Asynchronous Transfer Mode “ATM” cell; or any other series of bits having a prescribed format. The “payload” is generally defined as including the data associated with the message such as text, software, an image, an object, audio, video, a Uniform Resource Locator (URL), or other types of digital data. The “header” is generally defined as including control information. However, the specific types of control information depend on the network content type.
Other examples of network content include email, which may be transmitted using an email protocol such as Simple Mail Transfer Protocol (SMTP), Post Office Protocol version 3 (POP3), or Internet Message Access Protocol (IMAP4). A further example of network content includes an Instant Message, which may be transmitted using Session Initiation Protocol (SIP) or Extensible Messaging and Presence Protocol (XMPP) for example. Yet another example of network content includes one or more files that are transferred using a data transfer protocol such as File Transfer Protocol (FTP) for subsequent storage on a file share. Where the network content is email, Instant Message or a file, the header may include the sender/recipient address, the sender/recipient phone number, or a targeted network location of the file, respectively.
The term “malware” is directed to software that produces an undesirable behavior upon execution, where the behavior is deemed to be “undesirable” based on customer-specific rules, manufacturer-based rules, or any other type of rules formulated by public opinion or a particular governmental or commercial entity. This undesired behavior may include a communication-based anomaly or an execution-based anomaly that (1) alters the functionality of an electronic device executing that application software in a malicious manner; (2) alters the functionality of an electronic device executing that application software without any malicious intent; and/or (3) provides an unwanted functionality which is generally acceptable in other context.
The term “transmission medium” is a communication path between two or more systems (e.g. any electronic devices with data processing functionality such as, for example, a security appliance, server, mainframe, computer, netbook, tablet, smart phone, router, switch, bridge or router). The communication path may include wired and/or wireless segments. Examples of wired and/or wireless segments include electrical wiring, optical fiber, cable, bus trace, or a wireless channel using infrared, radio frequency (RF), or any other wired/wireless signaling mechanism.
The term “object” generally refers to content in the form of an item of information having a logical structure or organization that enables it to be classified for purposes of analysis for malware. One example of the object may include an email message or a portion of the email message. Another example of the object may include a storage file or a document such as a Portable Document Format (PDF) document, a word processing document such as Word® document, or other information that may be subjected to cybersecurity analysis. The object may also include an executable such as an application, program, code segment, a script, dynamic link library “dll,” URL link, or any other element having a format that can be directly executed or interpreted by logic within the electronic device.
Lastly, the terms “or” and “and/or” as used herein are to be interpreted as inclusive or meaning any one or any combination. Therefore, “A, B or C” or “A, B and/or C” mean “any of the following: A; B; C; A and B; A and C; B and C; A, B and C.” An exception to this definition will occur only when a combination of elements, functions, steps or acts are in some way inherently mutually exclusive.
As this invention is susceptible to embodiments of many different forms, it is intended that the present disclosure is to be considered as an example of the principles of the invention and not intended to limit the invention to the specific embodiments shown and described.
Referring to
Each MCD device 110 can be adapted in many embodiments to receive and process binary code samples taken from network content for potential malicious code in real-time or at least near real-time. The network content is considered to be “suspicious” when a portion of the network content (e.g. payload data) is determined, with a certain level of likelihood, to include malware. In further embodiments, the binary code and/or binary content can be provided in an offline process such as, but not limited to, a user/system administrator presenting the data to be processed in the form of a drive coupled to the MCD device 110.
According to this embodiment of the communication network, a remote MCD system 110 may be a web-based security appliance that is configured to inspect ingress data traffic, identify whether any artifacts of the data traffic may include malware, and if so, analyze at least those artifacts. Unlike typical methods, this analysis does not need to be conducted in a virtual machine execution environment to detect anomalous behaviors that would be present if the data traffic were actually processed by an electronic device. Instead, the MCD system 110 may generate a symfunc hash value and compare it to previously generated symfunc hash values. The particulars of this analysis are described below.
As shown in
As further shown in
It is contemplated that one or more MCD devices 110 may be deployed across cloud computing services for malware detection as described. Furthermore, it is contemplated that the functionality of one or more MCD devices 110 may be incorporated into another management system when malware detection is to be conducted at a centralized resource.
Referring now to
The input/output interface 220 can enable communications with other components including other MCD systems 110, 140 as depicted in of
In certain embodiments, the processor 220 can be communicatively coupled to persistent storage 240 over an external transmission medium via the I/O interface 230. According to one embodiment of the disclosure, the persistent storage 240 may load the malware detection logic 260 within a volatile memory for execution. Of course, in embodiments where the logic is implemented as hardware, malware detection logic 260, including the sub components of the binary disassembler 261, the symbolic analyzer 262, morphologic reducer 263, symbolic function hash generator 264, and (threat) classifier 265 would be implemented separately from persistent memory 240.
The malware detection logic 260 may be comprised of many sub-components or sub-systems with internal logic suited for particular tasks. In one embodiment illustrated in
In many embodiments, the binary disassembler logic 261 can accept suspect binary objects as an input and disassemble the binary object into a series of opcodes along with other data including functional meta-information such as function start and end points along with various function calls. The disassembly can be accomplished through a variety of methods, but typically involves recursive code flow disassembly. Such disassembly can utilize tools including, but not limited to customized builds of readily available commercial or open source disassembler tools. In some embodiments, the disassembler logic 261 can be located within a separate system or MCD device 210. In these embodiments, the input binary objects may be passed across a network or other communication channel to the remote binary disassembler logic for processing and return.
The types of output data from the binary disassembler logic 261 can also include a serial list of functions, a cross-reference list to other functions called or referenced. Additional embodiments may extract string and integer constants from functions for further analysis or elimination. Finally, many embodiments of the binary disassembler logic 261 can generate a control flow graph (CFG) of every function within the suspect binary object input. Collectively, all of these opcodes, CFGs, lists, and other meta-information can be contained and/or classified as disassembled code data for passing to other components for further processing.
For example, symbolic analyzer logic 262 can accept disassembled code data as input generated from the binary disassembler logic 261 or elsewhere either locally or remotely. Symbolic analyzer logic 262 can generate semantic representations of the input functions as symbolic representation data, which allows for a further abstraction of the suspect binary object.
This process can be accomplished in numerous ways. In many embodiments, the symbolic analyzer logic 262 can generate an emulation environment of actual hardware and attempt to determine what the symbolic execution would be for a given path. In certain embodiments, the emulation is a representation of a given hardware system at a particular, pre-determined state. In other embodiments, a full virtualization environment could be utilized. The symbolic analyzer logic 262 can emulate a variety of systems including Intel® X86 and X64 style architectures. It would be well understood to those skilled in the art that similar emulation methods could be extended to any of a variety of hardware architectures and systems including, but not limited to, ARM, PowerPC, and RISC based architecture families.
It would be understood by those skilled in the art, that when utilizing an emulation system, the problem of what code path to take is present. Depending on the complexity of the function involved, the number of potential options and paths increases exponentially and can become unwieldy to compute. In many embodiments, a heuristic path is utilized for the emulation path traversal. These heuristic paths can include, but are not limited to, shortest path, longest path, longest reachable path, specific property path, predictive look ahead path, and/or weighted paths based on various aspects like function calls and data writes.
In a number of embodiments, the emulated system begins at the same state for each evaluation in order to replicate results. The symbolic analyzer logic 262 can process the disassembled code and determine various actions that would be done to hardware via emulation such as, but not limited to, register/flag changes. Through the symbolic representation, it can be determined what each part of the emulated machine is doing during the processing of the disassembled code data. By way of example, it can be determined that two items within memory were added together to make a new value. Such emulation allows the generation of a full symbolic logic description of each part of the disassembled code data. Further chaining of the symbolic logic can yield a map of all changes within an emulated system which may allow a user to track the relationships between the inputs and outputs of a suspected binary object.
Because the symbolic analyzer logic 262 analyzes, fully evaluates, and generates full symbolic logic for each part of the disassembled code data, the final symbolic representation data can be larger than the input data of the disassembled code data, which is itself typically larger than the suspected binary object. In many instances the increased size of the symbolic representation may reduce the efficiency in processing and contain irrelevant data for the determination of a suspected binary object's attributes. In many embodiments, in order to reduce the amount of irrelevant data to process, and to speed up the eventual parsing and processing of the remaining steps in the evaluation process, morphologic reducer logic 263 may be utilized to accept incoming symbolic representation data and eliminate portions of the symbolic representation data that may not be necessary for further processing and analysis. Those skilled in the art will recognize morphologic reducer logic, such as that provided in The Z3 Theorem Prover™ by Microsoft Corporation of Redmond, Wash. for example or any other satisfiability modulo theories (“SMT”) solver.
In a number of embodiments, the morphologic reducer logic 263 may process the symbolic representation data by classifying such data into multiple classes. By way of example and not limitation, the morphologic reducer logic 263 can reduce input data into categories based on whether a function reads or writes to memory, whether a function calls or returns from a function, and/or other function processes that are similar across all functions. Once classified, each category of data can be further processed and/or eliminated based on certain pre-determined rules set by either the system or the user. By way of example and not limitation, the morphologic reducer logic 263 may have rules set up to disregard functions that read from the disk and/or to eliminate data relating to functions based on what functions they return from. Typically, rules governing the morphologic reducer logic 263 can be set up to eliminate elements of the symbolic representation data that may be similar to many other, if not virtually all other function data. For example, certain aspects of binary objects may all have similar calls to various compiler specific functions necessary for normal operation. Because many functions may share similar elements, the possibility of extracting useful information from these aspects of the suspected binary object is extremely low and can typically be eliminated from further processing. Morphologic reducer logic 263 can be set up with predetermined rules from a user/system administrator based on what elements are not valuable for recognizing the functional behavior of binary object analysis.
The output data of the morphologic reducer logic 263 is then a simplified set of equations compared to the input symbolic representation data. These relatively simple list of equations can be considered a symboliks list wherein each individual equation can be considered a “symbolik” The entire package of symboliks can be considered a single symboliks function object or “symfunc object.” Typically, in this state, the symfunc object is still in a human-readable state which can illustrate the potential actions of a suspected binary object if it was run within a system similar to the emulated system utilized in the symbolic analyzer logic 262. In order to make the process scalable, the symfunc object data can further be abstracted through the use of symfunc hash generator logic 264 which can take the symfunc object data and output a plurality of hashes for further analysis.
In a number of embodiments, the symfunc hash generator logic 264 accepts symfunc object data as input and outputs a plurality of symfunc hash values as output. In certain embodiments, the hashes can be 128-bit hash values similar to message-digest 5 (“MD5”) hashes and can be generated using MD5 algorithms. Those skilled in the art will recognize that alternative hashing methods may be utilized to further abstract the symfunc object data for use in further classifications.
Depending on the type of analysis to be done, the generated symfunc hash values can be obtained by hashing the entire symfunc object data input. Similarly, multiple symfunc hash values may be generated by hashing multiple subsets of the symfunc object data. The amount of hashes produced can be a function of the size of the suspect binary object and resulting symfunc object, but in some embodiments, the amount of hashes generated could also be related to the complexity of the functions within the suspect binary object as well. The generated symfunc hash values can be used as input to classifier logic 265 which can compare the generated symfunc hash values against other known symfunc hash values for large scale classification of the suspect binary object.
Classifier logic 265 may be configured, in one or more embodiments, to accept a plurality of input symfunc hash values and compare the input symfunc hash values to previously generated symfunc hash values. This comparison is conducted to classify the input symfunc hash values based on their similarity to the previously generated symfunc hash values. In many embodiments, classifier logic 265 can generate classification data based on multiple methods of analysis including, but not limited to, a specific method and/or a weighted method.
In response to comparing an input symfunc hash value against previously generated symfunc hash values, the classifier logic 265 can generate data relating to the number of matches found of the input symfunc hash value against the previously generated ones. In many embodiments, certain characteristics relating to the similarity of the input symfunc hash value to previously generated hashes can be determined based on the number of matches between them. By way of example, and not limitation, a symfunc hash value that matches with over a thousand other previously generated symfunc hash values may show that this particular symfunc hash value (and associated suspect binary object) may be common and less of a threat. Alternatively, an input symfunc hash value that does not match to any other previously generated hashes will likely not be able to be correlated in meaningful ways. Thus, when an input symfunc hash value has a match with other previously generated symfunc hash values that is above a first lower pre-determined threshold, but below another higher pre-determined threshold, a strong correlation can be found between the compared symfunc hash values. In certain embodiments, such a symfunc hash value can be understood as an “anchor hash value.” Those skilled in the art will recognize that both the higher and lower pre-determined thresholds can be of any value that sufficiently creates a correlation between the input symfunc hash value and the previously generated symfunc hash values and can vary based upon the type of application and results desired by the user/system administrator. The only requirement is that the lower threshold is quantitatively lower than the upper threshold.
As those skilled in the art would recognize, a “match” may be utilized in various ways depending on the application. By way of example, and not limitation, a match may be found by a direct correlation between hash values and/or partial hash values. In further embodiments, a match may be a prescribed level of correlation based on a pre-determined threshold set by the user and/or system administrator. In still further embodiments, a “fingerprint” may be construed as a plurality of indicators that collectively identify an object under analysis against other malware family fingerprints. Malware similarity analysis that can be utilized in accordance with embodiments of the invention are described in U.S. patent application Ser. No. 15/280,854, filed Sep. 29, 2016, entitled “Advanced Malware Detection Using Similarity Analysis” the disclosure of which is hereby incorporated by reference in its entirety. As such, it is contemplated that lower and upper thresholds, as described above, may be other values that correspond to alternative forms of matching.
In a number of embodiments, classifier logic 265 may stop further analysis when an anchor hash value has been found. In the absence of anchor hash values, classifier logic 265 may proceed with a weighted analysis of the symfunc hash values based on the number of matches. Such weighted analysis can be accomplished through the use of statistical tools including a Jaccard index and/or Tanimoto distance, although any number of methods can be utilized to determine the relative relationship between the two sets of data.
Upon generation of the classification data, the system 210 may initiate response logic 266 to take a number of actions including, but not limited to, communicating the findings based on the type of classification data present. For example, the presence of an anchor hash value may allow the system 210 to take immediate steps without further user/system administrator input. Classification data that includes weighted analysis data may be sent via the system I/O 230 to a user/system administrator for further review. In further embodiments, other remedial actions may occur such as quarantining the analyzed binary object, generating a hunt for the binary object throughout the network, and/or ceasing or preventing further processing of the binary object within the system.
Referring to
The MCD system can receive 320 suspicious binary objects for evaluation from remote sources or local devices and/or systems through any viable transmission medium. In response to the receiving 320 of a suspicious binary object, the MCD can then evaluate 330 the resultant hash values derived from the binary object to determine if the binary object is malicious. It is contemplated that the triggers or other thresholds of what is considered malicious by the MCD can be set or adjusted by the user/system administrator. By way of example and not limitation, thresholds may be adjusted periodically on a schedule or aperiodically as needed in response to immediate threats and/or updates. Further, the thresholds may be static or dynamic in nature based on the application. In a number of embodiments, the updating may be done online through a remote updating service. In further embodiments, the updating may be offline and occur via a variety of methods including, but not limited to, updates delivered via thumb drives inserted into the MCD, updates by system administrators via intranet connections, and/or through self-generated updates based on determined variables of the evaluation environment. The evaluation 330 of the binary object is outlined in more detail in
In response to the evaluation 330 of the suspicious binary object not being malicious, the binary object may be passed along for further processing or execution. Alternatively, if a suspicious binary object is evaluated 330 to be malicious, the MCD can respond by quarantining 350 the binary object and/or generating an alert as defined by the user/system administrator.
Referring now to
Upon receiving the disassembled code data, the symbolic analyzer can generate symbolic representation data of each piece of disassembled code data (block 420). The symbolic representation data can utilize the opcodes and memory maps to analyze the disassembled code data within an emulated system based on pre-determined paths. Upon completion of the generation of symbolic representation data, the symbolic analyzer logic can provide the generated symbolic representation data to a morphologic reducer for further processing (block 425). In certain embodiments, the system may provide the symbolic representation data to the morphologic reducer in pieces as it is generated.
The morphologic reducer logic can produce a symfunc object from the provided symbolic representation data (block 430). The morphologic reducer logic can accomplish this by classifying and removing data from the set of symbolic representation data based on those classifications. The purpose of this reduction is to make the dataset under analysis more manageable, to further abstract out the core functional behavior of the suspicious binary object, and to reduce the elements of the data that are likely common to all similar binary objects and thus, will likely yield little information that would be useful during the later classification steps. By way of example and not limitation, a morphologic reducer may be presented with multiple symbolic representations produced from different binary codes. The binary codes may share similar operations (for example, calling a function) but execute them in a different manner. The abstraction process attempts to reduce these differences away such that the semantic behavior of the function can be identified and analyzed.
The morphologic reducer logic, upon reduction, can provide the generated symfunc objects to a symbolic hash generator (block 440). The symbolic hash generator logic generates symfunc hash values out of the received symfunc objects (block 445). Many symfunc hash values can be generated from a single symfunc object based on various attributes such as, but not limited to, the size of the symfunc object, the complexity of the symfunc object, and/or settings pre-defined by the user/system administrator. In response to the generation of the symfunc hash values, the symfunc hash generator can provide the symfunc hash values to symfunc classifier logic (block 450).
In many embodiments, the classifier logic will take the provided symfunc hash values and compare them against previously known symfunc hash values (block 455). The previously known symfunc hash values typically comprise previously generated hashes that were classified and categorized and are constantly updated with newly generated and classified symfunc hash values. Based on the comparison, the classifier logic can determine if the symfunc hash value exceeds any pre-determined thresholds regarding the number of matches found against the known symfunc hash database (block 460). In many embodiments, the entire hash is compared against the entirety of the other hashes in the symfunc database. However, it is contemplated that a location sensitive hashing could be utilized to evaluate based on only a portion of the generated symfunc hash. Additionally, as outlined above, those skilled in the art would recognize, a “match” may be utilized in various ways depending on the application including determining a prescribed level of correlation based on a pre-determined threshold set by the user and/or system administrator. The user/system administrator can set up these thresholds as needed based on the type of classification desired. Even if no thresholds are met, the classifier logic further weights the symfunc against the previously generated symfunc database in order to classify the provided symfunc hash (block 465).
In response to the classifier logic determining if any thresholds were met or not, classification data is generated upon classifying the provided symfunc hash. It is contemplated that the classification data generated comprises determined threat level, certainty data, matching symfunc hash data, potential code family relationship data, and/or potential origin data. Based on the classification data generated, the classifier logic can respond based on a set of pre-determined response actions or can provide the data to an outside system that responds to the classification data (block 470).
In response to the classifier logic classifying the symfunc hash value (and the corresponding binary object it was generated from) to not be malicious, the system may allow the binary object to pass and proceed with transmission, reception, and/or execution. The system may respond to a classification of a symfunc hash value as malicious in any number of ways, including, but not limited to, quarantining the binary object the symfunc hash value was generated from, generating a report for evaluation by the user/system administrator, adding the symfunc hash value to the collection (e.g., data store or database) of known symfunc hash values, and/or generating an alert to other cybersecurity analysists, and/or providing the associated malicious binary object and associated data to a malware hunting service.
In various embodiments, the responsive action may include, but is not limited to, generating a report/alert, implementing a remedial action (quarantine, network hunt, halting processing, etc.) and/or generating a signature of the binary object. In additional embodiments, the resulting symfunc hash values could be provided to reverse engineering services that may attempt to group similar symfunc hash values in an attempt to classify binary samples, e.g. within a known malware family.
It is contemplated that each step of this evaluation 400 can be accomplished over multiple devices, either remotely or entirely within a single logical framework. By way of example and not limitation, the database of previously generated symfunc hash values can be located within a central store and accessed remotely for evaluation. In certain embodiments, the receiving 405 of a suspicious binary object for evaluation may be delivered by an end user device to an MCD that is remotely located. In some embodiments, the evaluation 400 can be accomplished within a front-line appliance in a network. In further embodiments, the entire evaluation 400 can be embedded and accomplished in the background of another process. In additional embodiments, a binary sample can be uploaded to a global data store re-classification system that may reevaluate the binary sample. Upon the determination that the initial classification was incorrect, subsequent notice and/or thresholds may be sent to MCD devices globally. Re-evaluation techniques that can be utilized in accordance with embodiments of the invention are described in U.S. patent application Ser. No. 16/222,194, filed Dec. 17, 2018, entitled “Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store” the disclosure of which is hereby incorporated by reference in its entirety.
Referring now to
Upon receipt of a suspicious binary object for evaluation, the binary disassembler 510 generates disassembled code 515 which may contain opcodes, control flow graphs, extracted string and integer constants (for elimination from analysis), and other data relating to the functions.
The disassembled code data 515 is fed into a symbolic analyzer logic 520 that processes and expands the disassembled code data 515 into symbolic representation data 525. The symbolic representation data 525 contains further abstracted data relating to the disassembled code data 515 comprising an abstract syntax tree (“AST”) and a list of symboliks which themselves comprise the relationships between the inputs and outputs of each function, describing what every piece of the emulated machine is doing in response to the binary object. These inputs and outputs include passed in arguments, local variables, etc.
The symbolic representation data 525 is fed into a morphologic reducer logic 530 that attempts to eliminate excessive pieces of data and package the data into reduced symfunc object data 535. The elimination of elements of the symbolic representation data 525 can be accomplished through the classification of functions and their actions, allowing for the generating of rule sets that can eliminate aspects of the functions for analysis based on the needs of the user/system administrator.
The reduced symfunc object data 535 is then sent to a symfunc hash generator 540 that generates at least one, but perhaps many symfunc hash values 545. The symfunc hash values can be typical 128-bit hashes but can vary in size and complexity as needed. The hashing process, in order to facilitate comparable results suitable for later comparison and classification, should follow a static, repeatable order/ruleset. By way of example and not limitation, the hashing process can order the symfunc object in a serial fashion with a first classified type of function placed first, followed by a second type of function, etc. Typically, a canonical representation is utilized for the hashing process. The type or ruleset or order does not have to be limited and is only limited by the usefulness of the results based on the hashing process used in the hashes stored in the database.
Generated symfunc hash values 545 are eventually given to the classifier logic 550 which then classifies the symfunc hash values based on a comparison against a database of known symfunc hash values. In response to this classification, the classifier logic 550 generates classification data 555 that can then be transmitted to another set of logic or used internally by the classifier logic 550 to generate a response to the classification. The response can be to let the binary object associated with the classified binary hash pass if it not determined to be malicious. Alternatively, the classification data can be used to generate a report based on any number of behaviors that were pre-determined by the user/system administrator in the case of a finding of malicious binary objects.
Referring now to
In response to receiving a symfunc hash, the system may begin the process of comparing the received symfunc hash value against the previously generated and stored, known symfunc hash values (blocks 605 and 610). The comparison typically produces data relating to the number of matches the symfunc hash value obtains, along with data relating to the matched symfunc hash values. The classifier logic counts the number of matches to determine the next operation (block 620). It is contemplated that the comparison may be done remotely by sending the received symfunc hash value to a remote system that has a local copy of the symfunc database and sends back data relating to the matches and counts. Furthermore, as outlined above, those skilled in the art would recognize, a “match” may be realized through various methods depending on the application including determining a prescribed level of correlation based on a pre-determined threshold set by the user and/or system administrator.
In the exemplary embodiment illustrated in
Finally, in response to the number of matches being both higher than the lower-end threshold, and lower than the higher-end threshold (block 624), the system may then draw a stronger correlation between the received symfunc hash value and the previously generated and known symfunc hash values in the database that were a match. In many embodiments, this situation can be considered an “anchor match” which can be utilized to create automatic responses and actions not otherwise available in other matches.
In these instances of an anchor match, the system may automatically determine and associate the received symfunc hash value attributes with the matched symfunc hash values and corresponding binary objects (block 630). Further, an anchor match may be automatically stored as another data point in the known symfunc database (block 635). Additionally, anchor matches may allow the system to automatically determine if the received symfunc hash value is malicious (block 640). In cases where the anchor match was to non-malicious binary objects, the process ends (block 641) and no further actions are attempted. Alternatively, when the anchor match is to known malicious code, the system can automatically execute pre-determined responsive behaviors that were requested by the user/system administrator. It is contemplated that data associated with the symfunc objects utilized in the anchor match (code family, type of threat, level of threat, etc.) are utilized to determine what responsive actions are executed (block 642).
In the foregoing description, the invention is described with reference to specific exemplary embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention as set forth in the appended claims.
This application claims priority to U.S. Provisional Patent Application No. 62/784,231, filed Dec. 21, 2018, titled “Determining Malware Via Symbolic Function Hash Analysis,” the disclosure of which are hereby incorporated herein by reference in its entirety.
| Number | Name | Date | Kind |
|---|---|---|---|
| 6898632 | Gordy et al. | May 2005 | B2 |
| 6941348 | Petry et al. | Sep 2005 | B2 |
| 7080407 | Zhao et al. | Jul 2006 | B1 |
| 7080408 | Pak et al. | Jul 2006 | B1 |
| 7243371 | Kasper et al. | Jul 2007 | B1 |
| 7308716 | Danford et al. | Dec 2007 | B2 |
| 7448084 | Apap et al. | Nov 2008 | B1 |
| 7458098 | Judge et al. | Nov 2008 | B2 |
| 7467408 | O'Toole, Jr. | Dec 2008 | B1 |
| 7496961 | Zimmer et al. | Feb 2009 | B2 |
| 7519990 | Xie | Apr 2009 | B1 |
| 7540025 | Tzadikario | May 2009 | B2 |
| 7639714 | Stolfo et al. | Dec 2009 | B2 |
| 7698548 | Shelest et al. | Apr 2010 | B2 |
| 7779463 | Stolfo et al. | Aug 2010 | B2 |
| 7854007 | Sprosts et al. | Dec 2010 | B2 |
| 7937387 | Frazier et al. | May 2011 | B2 |
| 7949849 | Lowe et al. | May 2011 | B2 |
| 8006305 | Aziz | Aug 2011 | B2 |
| 8020206 | Hubbard et al. | Sep 2011 | B2 |
| 8045458 | Alperovitch et al. | Oct 2011 | B2 |
| 8069484 | McMillan et al. | Nov 2011 | B2 |
| 8171553 | Aziz et al. | May 2012 | B2 |
| 8201246 | Wu et al. | Jun 2012 | B1 |
| 8204984 | Aziz et al. | Jun 2012 | B1 |
| 8214905 | Doukhvalov et al. | Jul 2012 | B1 |
| 8291499 | Aziz et al. | Oct 2012 | B2 |
| 8370938 | Daswani et al. | Feb 2013 | B1 |
| 8370939 | Zaitsev et al. | Feb 2013 | B2 |
| 8375444 | Aziz et al. | Feb 2013 | B2 |
| 8438644 | Watters et al. | May 2013 | B2 |
| 8464340 | Ahn et al. | Jun 2013 | B2 |
| 8494974 | Watters et al. | Jul 2013 | B2 |
| 8516593 | Aziz | Aug 2013 | B2 |
| 8528086 | Aziz | Sep 2013 | B1 |
| 8539582 | Aziz et al. | Sep 2013 | B1 |
| 8549638 | Aziz | Oct 2013 | B2 |
| 8561177 | Aziz et al. | Oct 2013 | B1 |
| 8566476 | Shiffer et al. | Oct 2013 | B2 |
| 8566946 | Aziz et al. | Oct 2013 | B1 |
| 8584239 | Aziz et al. | Nov 2013 | B2 |
| 8635696 | Aziz | Jan 2014 | B1 |
| 8689333 | Aziz | Apr 2014 | B2 |
| 8713681 | Silberman et al. | Apr 2014 | B2 |
| 8776229 | Aziz | Jul 2014 | B1 |
| 8793278 | Frazier et al. | Jul 2014 | B2 |
| 8793787 | Ismael et al. | Jul 2014 | B2 |
| 8813050 | Watters et al. | Aug 2014 | B2 |
| 8832829 | Manni et al. | Sep 2014 | B2 |
| 8850571 | Staniford et al. | Sep 2014 | B2 |
| 8881271 | Butler, II | Nov 2014 | B2 |
| 8881282 | Aziz et al. | Nov 2014 | B1 |
| 8898788 | Aziz et al. | Nov 2014 | B1 |
| 8935779 | Manni et al. | Jan 2015 | B2 |
| 8949257 | Shiffer et al. | Feb 2015 | B2 |
| 8984638 | Aziz et al. | Mar 2015 | B1 |
| 8990939 | Staniford et al. | Mar 2015 | B2 |
| 8990944 | Singh et al. | Mar 2015 | B1 |
| 8997219 | Staniford et al. | Mar 2015 | B2 |
| 9009822 | Ismael et al. | Apr 2015 | B1 |
| 9009823 | Ismael et al. | Apr 2015 | B1 |
| 9015846 | Watters et al. | Apr 2015 | B2 |
| 9027135 | Aziz | May 2015 | B1 |
| 9071638 | Aziz et al. | Jun 2015 | B1 |
| 9104867 | Thioux et al. | Aug 2015 | B1 |
| 9106630 | Frazier et al. | Aug 2015 | B2 |
| 9106694 | Aziz et al. | Aug 2015 | B2 |
| 9118715 | Staniford et al. | Aug 2015 | B2 |
| 9159035 | Ismael et al. | Oct 2015 | B1 |
| 9171160 | Vincent et al. | Oct 2015 | B2 |
| 9176843 | Ismael et al. | Nov 2015 | B1 |
| 9189627 | Islam | Nov 2015 | B1 |
| 9195829 | Goradia et al. | Nov 2015 | B1 |
| 9197664 | Aziz et al. | Nov 2015 | B1 |
| 9208235 | Liu | Dec 2015 | B1 |
| 9223972 | Vincent et al. | Dec 2015 | B1 |
| 9225740 | Ismael et al. | Dec 2015 | B1 |
| 9241010 | Bennett et al. | Jan 2016 | B1 |
| 9251343 | Vincent et al. | Feb 2016 | B1 |
| 9262635 | Paithane et al. | Feb 2016 | B2 |
| 9268936 | Butler | Feb 2016 | B2 |
| 9275229 | LeMasters | Mar 2016 | B2 |
| 9282109 | Aziz et al. | Mar 2016 | B1 |
| 9292686 | Ismael et al. | Mar 2016 | B2 |
| 9294501 | Mesdaq et al. | Mar 2016 | B2 |
| 9300686 | Pidathala et al. | Mar 2016 | B2 |
| 9306960 | Aziz | Apr 2016 | B1 |
| 9306974 | Aziz et al. | Apr 2016 | B1 |
| 9311479 | Manni et al. | Apr 2016 | B1 |
| 9355247 | Thioux et al. | May 2016 | B1 |
| 9356944 | Aziz | May 2016 | B1 |
| 9363280 | Rivlin et al. | Jun 2016 | B1 |
| 9367681 | Ismael et al. | Jun 2016 | B1 |
| 9398028 | Karandikar et al. | Jul 2016 | B1 |
| 9413781 | Cunningham et al. | Aug 2016 | B2 |
| 9426071 | Caldejon et al. | Aug 2016 | B1 |
| 9430646 | Mushtaq et al. | Aug 2016 | B1 |
| 9432389 | Khalid et al. | Aug 2016 | B1 |
| 9438613 | Paithane et al. | Sep 2016 | B1 |
| 9438622 | Staniford et al. | Sep 2016 | B1 |
| 9438623 | Thioux et al. | Sep 2016 | B1 |
| 9459901 | Jung et al. | Oct 2016 | B2 |
| 9467460 | Otvagin et al. | Oct 2016 | B1 |
| 9483644 | Paithane et al. | Nov 2016 | B1 |
| 9495180 | Ismael | Nov 2016 | B2 |
| 9497213 | Thompson et al. | Nov 2016 | B2 |
| 9507935 | Ismael et al. | Nov 2016 | B2 |
| 9507945 | Kouskoulas | Nov 2016 | B2 |
| 9516057 | Aziz | Dec 2016 | B2 |
| 9519782 | Aziz et al. | Dec 2016 | B2 |
| 9536091 | Paithane et al. | Jan 2017 | B2 |
| 9537972 | Edwards et al. | Jan 2017 | B1 |
| 9542559 | Brumley | Jan 2017 | B2 |
| 9560059 | Islam | Jan 2017 | B1 |
| 9565202 | Kindlund et al. | Feb 2017 | B1 |
| 9591015 | Amin et al. | Mar 2017 | B1 |
| 9591020 | Aziz | Mar 2017 | B1 |
| 9594904 | Jain et al. | Mar 2017 | B1 |
| 9594905 | Ismael et al. | Mar 2017 | B1 |
| 9594912 | Thioux et al. | Mar 2017 | B1 |
| 9609007 | Rivlin et al. | Mar 2017 | B1 |
| 9626509 | Khalid et al. | Apr 2017 | B1 |
| 9628498 | Aziz et al. | Apr 2017 | B1 |
| 9628507 | Haq et al. | Apr 2017 | B2 |
| 9633134 | Ross | Apr 2017 | B2 |
| 9635039 | Islam et al. | Apr 2017 | B1 |
| 9641546 | Manni et al. | May 2017 | B1 |
| 9654485 | Neumann | May 2017 | B1 |
| 9661009 | Karandikar et al. | May 2017 | B1 |
| 9661018 | Aziz | May 2017 | B1 |
| 9674298 | Edwards et al. | Jun 2017 | B1 |
| 9680862 | Ismael et al. | Jun 2017 | B2 |
| 9690606 | Ha et al. | Jun 2017 | B1 |
| 9690933 | Singh et al. | Jun 2017 | B1 |
| 9690935 | Shiffer et al. | Jun 2017 | B2 |
| 9690936 | Malik et al. | Jun 2017 | B1 |
| 9736179 | Ismael | Aug 2017 | B2 |
| 9740857 | Ismael et al. | Aug 2017 | B2 |
| 9747446 | Pidathala et al. | Aug 2017 | B1 |
| 9749343 | Watters et al. | Aug 2017 | B2 |
| 9749344 | Watters et al. | Aug 2017 | B2 |
| 9756074 | Aziz et al. | Sep 2017 | B2 |
| 9773112 | Rather et al. | Sep 2017 | B1 |
| 9781144 | Otvagin et al. | Oct 2017 | B1 |
| 9787700 | Amin et al. | Oct 2017 | B1 |
| 9787706 | Otvagin et al. | Oct 2017 | B1 |
| 9792196 | Ismael et al. | Oct 2017 | B1 |
| 9824209 | Ismael et al. | Nov 2017 | B1 |
| 9824211 | Wilson | Nov 2017 | B2 |
| 9824216 | Khalid et al. | Nov 2017 | B1 |
| 9825976 | Gomez et al. | Nov 2017 | B1 |
| 9825989 | Mehra et al. | Nov 2017 | B1 |
| 9838408 | Karandikar et al. | Dec 2017 | B1 |
| 9838411 | Aziz | Dec 2017 | B1 |
| 9838416 | Aziz | Dec 2017 | B1 |
| 9838417 | Khalid et al. | Dec 2017 | B1 |
| 9846776 | Paithane et al. | Dec 2017 | B1 |
| 9876701 | Caldejon et al. | Jan 2018 | B1 |
| 9888016 | Amin et al. | Feb 2018 | B1 |
| 9888019 | Pidathala et al. | Feb 2018 | B1 |
| 9892261 | Joram et al. | Feb 2018 | B2 |
| 9904955 | Watters et al. | Feb 2018 | B2 |
| 9910988 | Vincent et al. | Mar 2018 | B1 |
| 9912644 | Cunningham | Mar 2018 | B2 |
| 9912681 | Ismael et al. | Mar 2018 | B1 |
| 9912684 | Aziz et al. | Mar 2018 | B1 |
| 9912691 | Mesdaq et al. | Mar 2018 | B2 |
| 9912698 | Thioux et al. | Mar 2018 | B1 |
| 9916440 | Paithane et al. | Mar 2018 | B1 |
| 9921978 | Chan et al. | Mar 2018 | B1 |
| 9934376 | Ismael | Apr 2018 | B1 |
| 9934381 | Kindlund et al. | Apr 2018 | B1 |
| 9946568 | Ismael et al. | Apr 2018 | B1 |
| 9954890 | Staniford et al. | Apr 2018 | B1 |
| 9973531 | Thioux | May 2018 | B1 |
| 10002252 | Ismael et al. | Jun 2018 | B2 |
| 10019338 | Goradia et al. | Jul 2018 | B1 |
| 10019573 | Silberman et al. | Jul 2018 | B2 |
| 10025691 | Ismael et al. | Jul 2018 | B1 |
| 10025927 | Khalid et al. | Jul 2018 | B1 |
| 10027689 | Rathor et al. | Jul 2018 | B1 |
| 10027690 | Aziz et al. | Jul 2018 | B2 |
| 10027696 | Rivlin et al. | Jul 2018 | B1 |
| 10033747 | Paithane et al. | Jul 2018 | B1 |
| 10033748 | Cunningham et al. | Jul 2018 | B1 |
| 10033753 | Islam et al. | Jul 2018 | B1 |
| 10033759 | Kabra et al. | Jul 2018 | B1 |
| 10050998 | Singh | Aug 2018 | B1 |
| 10063583 | Watters et al. | Aug 2018 | B2 |
| 10068091 | Aziz et al. | Sep 2018 | B1 |
| 10075455 | Zafar et al. | Sep 2018 | B2 |
| 10083302 | Paithane et al. | Sep 2018 | B1 |
| 10084813 | Eyada | Sep 2018 | B2 |
| 10089461 | Ha et al. | Oct 2018 | B1 |
| 10097573 | Aziz | Oct 2018 | B1 |
| 10104102 | Neumann | Oct 2018 | B1 |
| 10108446 | Steinberg et al. | Oct 2018 | B1 |
| 10121000 | Rivlin et al. | Nov 2018 | B1 |
| 10122746 | Manni et al. | Nov 2018 | B1 |
| 10133863 | Bu et al. | Nov 2018 | B2 |
| 10133866 | Kumar et al. | Nov 2018 | B1 |
| 10146810 | Shiffer et al. | Dec 2018 | B2 |
| 10148693 | Singh et al. | Dec 2018 | B2 |
| 10165000 | Aziz et al. | Dec 2018 | B1 |
| 10169585 | Pilipenko et al. | Jan 2019 | B1 |
| 10176321 | Abbasi et al. | Jan 2019 | B2 |
| 10181029 | Ismael et al. | Jan 2019 | B1 |
| 10191861 | Steinberg et al. | Jan 2019 | B1 |
| 10192052 | Singh et al. | Jan 2019 | B1 |
| 10198574 | Thioux et al. | Feb 2019 | B1 |
| 10200384 | Mushtaq et al. | Feb 2019 | B1 |
| 10210329 | Malik et al. | Feb 2019 | B1 |
| 10216927 | Steinberg | Feb 2019 | B1 |
| 10218740 | Mesdaq et al. | Feb 2019 | B1 |
| 10242185 | Goradia | Mar 2019 | B1 |
| 10282548 | Aziz et al. | May 2019 | B1 |
| 10284574 | Aziz et al. | May 2019 | B1 |
| 10284575 | Paithane et al. | May 2019 | B2 |
| 10296437 | Ismael et al. | May 2019 | B2 |
| 10335738 | Paithane et al. | Jul 2019 | B1 |
| 10341363 | Vincent et al. | Jul 2019 | B1 |
| 10341365 | Ha | Jul 2019 | B1 |
| 10366231 | Singh et al. | Jul 2019 | B1 |
| 10380343 | Jung et al. | Aug 2019 | B1 |
| 10395029 | Steinberg | Aug 2019 | B1 |
| 10404725 | Rivlin et al. | Sep 2019 | B1 |
| 10417031 | Paithane et al. | Sep 2019 | B2 |
| 10417422 | Zhang | Sep 2019 | B2 |
| 10430586 | Paithane et al. | Oct 2019 | B1 |
| 10432649 | Bennett et al. | Oct 2019 | B1 |
| 10445502 | Desphande et al. | Oct 2019 | B1 |
| 10447728 | Steinberg | Oct 2019 | B1 |
| 10454950 | Aziz | Oct 2019 | B1 |
| 10454953 | Amin et al. | Oct 2019 | B1 |
| 10462173 | Aziz et al. | Oct 2019 | B1 |
| 10467411 | Pidathala et al. | Nov 2019 | B1 |
| 10467414 | Kindlund et al. | Nov 2019 | B1 |
| 10469512 | Ismael | Nov 2019 | B1 |
| 10474813 | Ismael | Nov 2019 | B1 |
| 10476906 | Siddiqui | Nov 2019 | B1 |
| 10476909 | Aziz et al. | Nov 2019 | B1 |
| 10491627 | Su | Nov 2019 | B1 |
| 10503904 | Singh et al. | Dec 2019 | B1 |
| 10505956 | Pidathala et al. | Dec 2019 | B1 |
| 10511614 | Aziz | Dec 2019 | B1 |
| 10515214 | Vincent et al. | Dec 2019 | B1 |
| 10523609 | Subramanian | Dec 2019 | B1 |
| 10528726 | Ismael | Jan 2020 | B1 |
| 10534906 | Paithane et al. | Jan 2020 | B1 |
| 10552610 | Vashisht et al. | Feb 2020 | B1 |
| 10554507 | Siddiqui et al. | Feb 2020 | B1 |
| 10565378 | Vincent et al. | Feb 2020 | B1 |
| 10567405 | Aziz | Feb 2020 | B1 |
| 10572665 | Jung et al. | Feb 2020 | B2 |
| 10581874 | Khalid et al. | Mar 2020 | B1 |
| 10581879 | Paithane et al. | Mar 2020 | B1 |
| 10581898 | Singh | Mar 2020 | B1 |
| 10587636 | Aziz et al. | Mar 2020 | B1 |
| 10587647 | Khalid et al. | Mar 2020 | B1 |
| 10592678 | Ismael et al. | Mar 2020 | B1 |
| 10601848 | Jeyaraman et al. | Mar 2020 | B1 |
| 10601863 | Siddiqui | Mar 2020 | B1 |
| 10601865 | Mesdaq et al. | Mar 2020 | B1 |
| 10616266 | Otvagin | Apr 2020 | B1 |
| 10621338 | Pfoh et al. | Apr 2020 | B1 |
| 10623434 | Aziz et al. | Apr 2020 | B1 |
| 10637880 | Islam et al. | Apr 2020 | B1 |
| 10642753 | Steinberg | May 2020 | B1 |
| 10657251 | Malik et al. | May 2020 | B1 |
| 10666686 | Singh et al. | May 2020 | B1 |
| 10671721 | Otvagin et al. | Jun 2020 | B1 |
| 10671726 | Paithane et al. | Jun 2020 | B1 |
| 10701091 | Cunningham et al. | Jun 2020 | B1 |
| 10706149 | Vincent | Jul 2020 | B1 |
| 10713358 | Sikorski et al. | Jul 2020 | B2 |
| 10713362 | Vincent et al. | Jul 2020 | B1 |
| 10715542 | Wei et al. | Jul 2020 | B1 |
| 10726127 | Steinberg | Jul 2020 | B1 |
| 10728263 | Neumann | Jul 2020 | B1 |
| 10735458 | Haq et al. | Aug 2020 | B1 |
| 10740456 | Ismael et al. | Aug 2020 | B1 |
| 10747872 | Ha et al. | Aug 2020 | B1 |
| 10757120 | Aziz et al. | Aug 2020 | B1 |
| 10757134 | Eyada | Aug 2020 | B1 |
| 10785255 | Otvagin et al. | Sep 2020 | B1 |
| 10791138 | Siddiqui et al. | Sep 2020 | B1 |
| 10795991 | Ross et al. | Oct 2020 | B1 |
| 10798112 | Siddiqui et al. | Oct 2020 | B2 |
| 10798121 | Khalid et al. | Oct 2020 | B1 |
| 10805340 | Goradia | Oct 2020 | B1 |
| 10805346 | Kumar et al. | Oct 2020 | B2 |
| 10812513 | Manni et al. | Oct 2020 | B1 |
| 10817606 | Vincent | Oct 2020 | B1 |
| 10826931 | Quan et al. | Nov 2020 | B1 |
| 10826933 | Ismael et al. | Nov 2020 | B1 |
| 10834107 | Paithane et al. | Nov 2020 | B1 |
| 10846117 | Steinberg | Nov 2020 | B1 |
| 10848397 | Siddiqui et al. | Nov 2020 | B1 |
| 10848521 | Thioux et al. | Nov 2020 | B1 |
| 10853483 | Ikuse | Dec 2020 | B2 |
| 10855700 | Jeyaraman et al. | Dec 2020 | B1 |
| 10868818 | Rather et al. | Dec 2020 | B1 |
| 10872151 | Kumar et al. | Dec 2020 | B1 |
| 10873597 | Mehra et al. | Dec 2020 | B1 |
| 10887328 | Paithane et al. | Jan 2021 | B1 |
| 10893059 | Aziz et al. | Jan 2021 | B1 |
| 10893068 | Khalid et al. | Jan 2021 | B1 |
| 10902117 | Singh et al. | Jan 2021 | B1 |
| 10902119 | Vashisht et al. | Jan 2021 | B1 |
| 10904286 | Liu | Jan 2021 | B1 |
| 10929266 | Goradia et al. | Feb 2021 | B1 |
| 20020038430 | Edwards et al. | Mar 2002 | A1 |
| 20020091819 | Melchione et al. | Jul 2002 | A1 |
| 20020095607 | Lin-Hendel | Jul 2002 | A1 |
| 20020169952 | DiSanto et al. | Nov 2002 | A1 |
| 20020184528 | Shevenell et al. | Dec 2002 | A1 |
| 20020188887 | Largman et al. | Dec 2002 | A1 |
| 20030084318 | Schertz | May 2003 | A1 |
| 20030188190 | Aaron et al. | Oct 2003 | A1 |
| 20030191957 | Hypponen et al. | Oct 2003 | A1 |
| 20040015712 | Szor | Jan 2004 | A1 |
| 20040019832 | Arnold et al. | Jan 2004 | A1 |
| 20040117478 | Triulzi et al. | Jun 2004 | A1 |
| 20040117624 | Brandt et al. | Jun 2004 | A1 |
| 20040236963 | Danford et al. | Nov 2004 | A1 |
| 20040255161 | Cavanaugh | Dec 2004 | A1 |
| 20040268147 | Wiederin et al. | Dec 2004 | A1 |
| 20050021740 | Bar et al. | Jan 2005 | A1 |
| 20050086523 | Zimmer et al. | Apr 2005 | A1 |
| 20050091513 | Mitomo et al. | Apr 2005 | A1 |
| 20050108562 | Khazan et al. | May 2005 | A1 |
| 20050125195 | Brendel | Jun 2005 | A1 |
| 20050149726 | Joshi et al. | Jul 2005 | A1 |
| 20050157662 | Bingham et al. | Jul 2005 | A1 |
| 20050238005 | Chen et al. | Oct 2005 | A1 |
| 20050262562 | Gassoway | Nov 2005 | A1 |
| 20050283839 | Cowburn | Dec 2005 | A1 |
| 20060010495 | Cohen et al. | Jan 2006 | A1 |
| 20060015715 | Anderson | Jan 2006 | A1 |
| 20060015747 | Van de Ven | Jan 2006 | A1 |
| 20060021029 | Brickell et al. | Jan 2006 | A1 |
| 20060031476 | Mathes et al. | Feb 2006 | A1 |
| 20060070130 | Costea et al. | Mar 2006 | A1 |
| 20060117385 | Mester et al. | Jun 2006 | A1 |
| 20060123477 | Raghavan et al. | Jun 2006 | A1 |
| 20060150249 | Gassen et al. | Jul 2006 | A1 |
| 20060161987 | Levy-Yurista | Jul 2006 | A1 |
| 20060173992 | Weber et al. | Aug 2006 | A1 |
| 20060191010 | Benjamin | Aug 2006 | A1 |
| 20060242709 | Seinfeld et al. | Oct 2006 | A1 |
| 20060251104 | Koga | Nov 2006 | A1 |
| 20060288417 | Bookbinder et al. | Dec 2006 | A1 |
| 20070006288 | Mayfield et al. | Jan 2007 | A1 |
| 20070006313 | Porras et al. | Jan 2007 | A1 |
| 20070011174 | Takaragi et al. | Jan 2007 | A1 |
| 20070016951 | Piccard et al. | Jan 2007 | A1 |
| 20070064689 | Shin et al. | Mar 2007 | A1 |
| 20070143827 | Nicodemus et al. | Jun 2007 | A1 |
| 20070157306 | Elrod et al. | Jul 2007 | A1 |
| 20070192858 | Lum | Aug 2007 | A1 |
| 20070208822 | Wang et al. | Sep 2007 | A1 |
| 20070240218 | Tuvell et al. | Oct 2007 | A1 |
| 20070240220 | Tuvell et al. | Oct 2007 | A1 |
| 20070240222 | Tuvell et al. | Oct 2007 | A1 |
| 20070250930 | Aziz et al. | Oct 2007 | A1 |
| 20080005782 | Aziz | Jan 2008 | A1 |
| 20080040710 | Chiriac | Feb 2008 | A1 |
| 20080072326 | Danford et al. | Mar 2008 | A1 |
| 20080077793 | Tan et al. | Mar 2008 | A1 |
| 20080134334 | Kim et al. | Jun 2008 | A1 |
| 20080141376 | Clausen et al. | Jun 2008 | A1 |
| 20080184367 | McMillan et al. | Jul 2008 | A1 |
| 20080189787 | Arnold et al. | Aug 2008 | A1 |
| 20080307524 | Singh et al. | Dec 2008 | A1 |
| 20080320594 | Jiang | Dec 2008 | A1 |
| 20090003317 | Kasralikar et al. | Jan 2009 | A1 |
| 20090064332 | Porras et al. | Mar 2009 | A1 |
| 20090083855 | Apap et al. | Mar 2009 | A1 |
| 20090125976 | Wassermann et al. | May 2009 | A1 |
| 20090126015 | Monastyrsky et al. | May 2009 | A1 |
| 20090144823 | Lamastra et al. | Jun 2009 | A1 |
| 20090158430 | Borders | Jun 2009 | A1 |
| 20090172815 | Gu et al. | Jul 2009 | A1 |
| 20090198651 | Shiffer et al. | Aug 2009 | A1 |
| 20090198670 | Shiffer et al. | Aug 2009 | A1 |
| 20090198689 | Frazier et al. | Aug 2009 | A1 |
| 20090199274 | Frazier et al. | Aug 2009 | A1 |
| 20090241190 | Todd et al. | Sep 2009 | A1 |
| 20090300589 | Watters et al. | Dec 2009 | A1 |
| 20100017546 | Poo et al. | Jan 2010 | A1 |
| 20100030996 | Butler, II | Feb 2010 | A1 |
| 20100058474 | Hicks | Mar 2010 | A1 |
| 20100077481 | Polyakov et al. | Mar 2010 | A1 |
| 20100115621 | Staniford et al. | May 2010 | A1 |
| 20100132038 | Zaitsev | May 2010 | A1 |
| 20100154056 | Smith et al. | Jun 2010 | A1 |
| 20100192223 | Ismael et al. | Jul 2010 | A1 |
| 20100281542 | Stolfo et al. | Nov 2010 | A1 |
| 20110078794 | Manni et al. | Mar 2011 | A1 |
| 20110093951 | Aziz | Apr 2011 | A1 |
| 20110099633 | Aziz | Apr 2011 | A1 |
| 20110099635 | Silberman et al. | Apr 2011 | A1 |
| 20110167493 | Song et al. | Jul 2011 | A1 |
| 20110173213 | Frazier et al. | Jul 2011 | A1 |
| 20110178942 | Watters et al. | Jul 2011 | A1 |
| 20110219450 | McDougal et al. | Sep 2011 | A1 |
| 20110225624 | Sawhney et al. | Sep 2011 | A1 |
| 20110247072 | Staniford et al. | Oct 2011 | A1 |
| 20110307954 | Melnik et al. | Dec 2011 | A1 |
| 20110307955 | Kaplan et al. | Dec 2011 | A1 |
| 20110307956 | Yermakov et al. | Dec 2011 | A1 |
| 20110314546 | Aziz et al. | Dec 2011 | A1 |
| 20120117652 | Manni et al. | May 2012 | A1 |
| 20120174186 | Aziz et al. | Jul 2012 | A1 |
| 20120174218 | McCoy et al. | Jul 2012 | A1 |
| 20120210423 | Friedrichs et al. | Aug 2012 | A1 |
| 20120222121 | Staniford et al. | Aug 2012 | A1 |
| 20120233698 | Watters et al. | Sep 2012 | A1 |
| 20120278886 | Luna | Nov 2012 | A1 |
| 20120331553 | Aziz et al. | Dec 2012 | A1 |
| 20130036472 | Aziz | Feb 2013 | A1 |
| 20130047257 | Aziz | Feb 2013 | A1 |
| 20130097706 | Titonis et al. | Apr 2013 | A1 |
| 20130185795 | Winn et al. | Jul 2013 | A1 |
| 20130227691 | Aziz et al. | Aug 2013 | A1 |
| 20130232577 | Watters et al. | Sep 2013 | A1 |
| 20130247186 | LeMasters | Sep 2013 | A1 |
| 20130282426 | Watters et al. | Oct 2013 | A1 |
| 20130291109 | Staniford et al. | Oct 2013 | A1 |
| 20130318038 | Shiffer et al. | Nov 2013 | A1 |
| 20130318073 | Shiffer et al. | Nov 2013 | A1 |
| 20130325791 | Shiffer et al. | Dec 2013 | A1 |
| 20130325792 | Shiffer et al. | Dec 2013 | A1 |
| 20130325871 | Shiffer et al. | Dec 2013 | A1 |
| 20130325872 | Shiffer et al. | Dec 2013 | A1 |
| 20140032875 | Butler | Jan 2014 | A1 |
| 20140181131 | Ross | Jun 2014 | A1 |
| 20140189687 | Jung et al. | Jul 2014 | A1 |
| 20140189866 | Shiffer et al. | Jul 2014 | A1 |
| 20140189882 | Jung et al. | Jul 2014 | A1 |
| 20140237600 | Silberman et al. | Aug 2014 | A1 |
| 20140280245 | Wilson | Sep 2014 | A1 |
| 20140283037 | Sikorski et al. | Sep 2014 | A1 |
| 20140283063 | Thompson et al. | Sep 2014 | A1 |
| 20140297494 | Watters et al. | Oct 2014 | A1 |
| 20140337836 | Ismael | Nov 2014 | A1 |
| 20140344926 | Cunningham et al. | Nov 2014 | A1 |
| 20140380473 | Bu et al. | Dec 2014 | A1 |
| 20140380474 | Paithane et al. | Dec 2014 | A1 |
| 20150007312 | Pidathala et al. | Jan 2015 | A1 |
| 20150096022 | Vincent et al. | Apr 2015 | A1 |
| 20150096023 | Mesdaq et al. | Apr 2015 | A1 |
| 20150096024 | Haq et al. | Apr 2015 | A1 |
| 20150096025 | Ismael | Apr 2015 | A1 |
| 20150180886 | Staniford et al. | Jun 2015 | A1 |
| 20150186645 | Aziz et al. | Jul 2015 | A1 |
| 20150199513 | Ismael et al. | Jul 2015 | A1 |
| 20150199531 | Ismael et al. | Jul 2015 | A1 |
| 20150199532 | Ismael et al. | Jul 2015 | A1 |
| 20150220735 | Paithane et al. | Aug 2015 | A1 |
| 20150372980 | Eyada | Dec 2015 | A1 |
| 20160004869 | Ismael et al. | Jan 2016 | A1 |
| 20160006756 | Ismael et al. | Jan 2016 | A1 |
| 20160044000 | Cunningham | Feb 2016 | A1 |
| 20160127393 | Aziz et al. | May 2016 | A1 |
| 20160191547 | Zafar et al. | Jun 2016 | A1 |
| 20160191550 | Ismael et al. | Jun 2016 | A1 |
| 20160241580 | Watters et al. | Aug 2016 | A1 |
| 20160241581 | Watters et al. | Aug 2016 | A1 |
| 20160261612 | Mesdaq et al. | Sep 2016 | A1 |
| 20160285914 | Singh et al. | Sep 2016 | A1 |
| 20160301703 | Aziz | Oct 2016 | A1 |
| 20160323295 | Joram et al. | Nov 2016 | A1 |
| 20160335110 | Paithane et al. | Nov 2016 | A1 |
| 20170083703 | Abbasi et al. | Mar 2017 | A1 |
| 20180013770 | Ismael | Jan 2018 | A1 |
| 20180048660 | Paithane et al. | Feb 2018 | A1 |
| 20180069891 | Watters et al. | Mar 2018 | A1 |
| 20180121316 | Ismael et al. | May 2018 | A1 |
| 20180288077 | Siddiqui et al. | Oct 2018 | A1 |
| 20190104154 | Kumar et al. | Apr 2019 | A1 |
| 20190132334 | Johns et al. | May 2019 | A1 |
| 20190207966 | Vashisht et al. | Jul 2019 | A1 |
| 20190207967 | Vashisht et al. | Jul 2019 | A1 |
| 20200089882 | Menahem | Mar 2020 | A1 |
| 20200252428 | Gardezi et al. | Aug 2020 | A1 |
| Number | Date | Country |
|---|---|---|
| 2439806 | Jan 2008 | GB |
| 2490431 | Oct 2012 | GB |
| 0206928 | Jan 2002 | WO |
| 0223805 | Mar 2002 | WO |
| 2007117636 | Oct 2007 | WO |
| 2008041950 | Apr 2008 | WO |
| 2011084431 | Jul 2011 | WO |
| 2011112348 | Sep 2011 | WO |
| 2012075336 | Jun 2012 | WO |
| 2012145066 | Oct 2012 | WO |
| 2013067505 | May 2013 | WO |
| Entry |
|---|
| “Mining Specification of Malicious Behavior”—Jha et al., UCSB, Sep. 2007 https://www.cs.ucsb.edu/.about.chris/research/doc/esec07.sub.--mining.pdf-. |
| “Network Security: NetDetector—Network Intrusion Forensic System (NIFS) Whitepaper”, (“NetDetector Whitepaper”), (2003). |
| “When Virtual is Better Than Real”, IEEEXplore Digital Library, available at, http://ieeexplore.ieee.org/xpl/articleDetails.isp?reload=true&arnumbe- r=990073, (Dec. 7, 2013). |
| Abdullah, et al., Visualizing Network Data for Intrusion Detection, 2005 IEEE Workshop on Information Assurance and Security, pp. 100-108. |
| Adetoye, Adedayo , et al., “Network Intrusion Detection & Response System”, (“Adetoye”), (Sep. 2003). |
| Apostolopoulos, George; hassapis, Constantinos; “V-eM: A cluster of Virtual Machines for Robust, Detailed, and High-Performance Network Emulation”, 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Sep. 11-14, 2006, pp. 117-126. |
| Aura, Tuomas, “Scanning electronic documents for personally identifiable information”, Proceedings of the 5th ACM workshop on Privacy in electronic society. ACM, 2006. |
| Baecher, “The Nepenthes Platform: An Efficient Approach to collect Malware”, Springer-verlag Berlin Heidelberg, (2006), pp. 165-184. |
| Bayer, et al., “Dynamic Analysis of Malicious Code”, J Comput Virol, Springer-Verlag, France., (2006), pp. 67-77. |
| Boubalos, Chris , “extracting syslog data out of raw pcap dumps, seclists.org, Honeypots mailing list archives”, available at http://seclists.org/honeypots/2003/q2/319 (“Boubalos”), (Jun. 5, 2003). |
| Chaudet, C., et al., “Optimal Positioning of Active and Passive Monitoring Devices”, International Conference on Emerging Networking Experiments and Technologies, Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, CoNEXT '05, Toulousse, France, (Oct. 2005), pp. 71-82. |
| Chen, P. M. and Noble, B. D., “When Virtual is Better Than Real, Department of Electrical Engineering and Computer Science”, University of Michigan (“Chen”) (2001). |
| Cisco “Intrusion Prevention for the Cisco ASA 5500-x Series” Data Sheet (2012). |
| Cohen, M.I. , “PyFlag—An advanced network forensic framework”, Digital investigation 5, Elsevier, (2008), pp. S112-S120. |
| Costa, M. , et al., “Vigilante: End-to-End Containment of Internet Worms”, SOSP '05, Association for Computing Machinery, Inc., Brighton U.K., (Oct. 23-26, 2005). |
| Didier Stevens, “Malicious PDF Documents Explained”, Security & Privacy, IEEE, IEEE Service Center, Los Alamitos, CA, US, vol. 9, No. 1, Jan. 1, 2011, pp. 80-82, XP011329453, ISSN: 1540-7993, DOI: 10.1109/MSP.2011.14. |
| Distler, “Malware Analysis: An Introduction”, SANS Institute InfoSec Reading Room, SANS Institute, (2007). |
| Dunlap, George W., et al., “ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay”, Proceeding of the 5th Symposium on Operating Systems Design and Implementation, USENIX Association, (“Dunlap”), (Dec. 9, 2002). |
| FireEye Malware Analysis & Exchange Network, Malware Protection System, FireEye Inc., 2010. |
| FireEye Malware Analysis, Modern Malware Forensics, FireEye Inc., 2010. |
| FireEye v.6.0 Security Target, pp. 1-35, Version 1.1, FireEye Inc., May 2011. |
| Goel, et al., Reconstructing System State for Intrusion Analysis, Apr. 2008 SIGOPS Operating Systems Review, vol. 42 Issue 3, pp. 21-28. |
| Gregg Keizer: “Microsoft's HoneyMonkeys Show Patching Windows Works”, Aug. 8, 2005, XP055143386, Retrieved from the Internet: URL:http://www.informationweek.com/microsofts-honeymonkeys-show-patching-windows-works/d/d-id/1035069? [retrieved on Jun. 1, 2016]. |
| Heng Yin et al, Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis, Research Showcase @ CMU, Carnegie Mellon University, 2007. |
| Hiroshi Shinotsuka, Malware Authors Using New Techniques to Evade Automated Threat Analysis Systems, Oct. 26, 2012, http://www.symantec.com/connect/blogs/, pp. 1-4. |
| Idika et al., A-Survey-of-Malware-Detection-Techniques, Feb. 2, 2007, Department of Computer Science, Purdue University. |
| Isohara, Takamasa, Keisuke Takemori, and Ayumu Kubota. “Kernel-based behavior analysis for android malware detection.” Computational intelligence and Security (CIS), 2011 Seventh International Conference on. IEEE, 2011. |
| Kaeo, Merike , “Designing Network Security”, (“Kaeo”), (Nov. 2003). |
| Kevin A Roundy et al.: “Hybrid Analysis and Control of Malware”, Sep. 15, 2010, Recent Advances in Intrusion Detection, Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 317-338, XP019150454 ISBN:978-3-642-15511-6. |
| Khaled Salah et al: “Using Cloud Computing to Implement a Security Overlay Network”, Security & Privacy, IEEE, IEEE Service Center, Los Alamitos, CA, US, vol. 11, No. 1, Jan. 1, 2013 (Jan. 1, 2013). |
| Kim, H. , et al., “Autograph: Toward Automated, Distributed Worm Signature Detection”, Proceedings of the 13th Usenix Security Symposium (Security 2004), San Diego, (Aug. 2004), pp. 271-286. |
| King, Samuel T., et al., “Operating System Support for Virtual Machines”, (“King”), (2003). |
| Kreibich, C. , et al., “Honeycomb-Creating Intrusion Detection Signatures Using Honeypots”, 2nd Workshop on Hot Topics in Networks (HotNets-11), Boston, USA, (2003). |
| Kristoff, J. , “Botnets, Detection and Mitigation: DNS-Based Techniques”, NU Security Day, (2005), 23 pages. |
| Lastline Labs, The Threat of Evasive Malware, Feb. 25, 2013, Lastline Labs, pp. 1-8. |
| Li et al., A VMM-Based System Call Interposition Framework for Program Monitoring, Dec. 2010, IEEE 16th International Conference on Parallel and Distributed Systems, pp. 706-711. |
| Lindorfer, Martina, Clemens Kolbitsch, and Paolo Milani Comparetti. “Detecting environment-sensitive malware.” Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2011. |
| Marchette, David J., “Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint”, (“Marchette”), (2001). |
| Moore, D. , et al., “Internet Quarantine: Requirements for Containing Self-Propagating Code”, INFOCOM, vol. 3, (Mar. 30-Apr. 3, 2003), pp. 1901-1910. |
| Morales, Jose A., et al., ““Analyzing and exploiting network behaviors of malware.””, Security and Privacy in Communication Networks. Springer Berlin Heidelberg, 2010. 20-34. |
| Mori, Detecting Unknown Computer Viruses, 2004, Springer-Verlag Berlin Heidelberg. |
| Natvig, Kurt , “SANDBOXII: Internet”, Virus Bulletin Conference, (“Natvig”), (Sep. 2002). |
| NetBIOS Working Group. Protocol Standard for a NetBIOS Service on a TCP/UDP transport: Concepts and Methods. STD 19, RFC 1001, Mar. 1987. |
| Newsome, J. , et al., “Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software”, In Proceedings of the 12th Annual Network and Distributed System Security, Symposium (NDSS '05), (Feb. 2005). |
| Nojiri, D. , et al., “Cooperation Response Strategies for Large Scale Attack Mitigation”, DARPA Information Survivability Conference and Exposition, vol. 1, (Apr. 22-24, 2003), pp. 293-302. |
| Oberheide et al., CloudAV.sub.--N-Version Antivirus in the Network Cloud, 17th USENIX Security Symposium USENIX Security '08 Jul. 28-Aug. 1, 2008 San Jose, CA. |
| Reiner Sailer, Enriquillo Valdez, Trent Jaeger, Roonald Perez, Leendertvan Doorn, John Linwood Griffin, Stefan Berger., sHype: Secure Hypervisor Appraoch to Trusted Virtualized Systems (Feb. 2, 2005) (“Sailer”). |
| Silicon Defense, “Worm Containment in the Internal Network”, (Mar. 2003), pp. 1-25. |
| Singh, S. , et al., “Automated Worm Fingerprinting”, Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation, San Francisco, California, (Dec. 2004). |
| Thomas H. Ptacek, and Timothy N. Newsham , “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”, Secure Networks, (“Ptacek”), (Jan. 1998). |
| Venezia, Paul, “NetDetector Captures Intrusions”, InfoWorld Issue 27, (“Venezia”), (Jul. 14, 2003). |
| Vladimir Getov: “Security as a Service in Smart Clouds—Opportunities and Concerns”, Computer Software and Applications Conference (COMPSAC), 2012 IEEE 36th Annual, IEEE, Jul. 16, 2012 (Jul. 16, 2012). |
| Wahid et al., Characterising the Evolution in Scanning Activity of Suspicious Hosts, Oct. 2009, Third International Conference on Network and System Security, pp. 344-350. |
| Whyte, et al., “DNS-Based Detection of Scanning Works in an Enterprise Network”, Proceedings of the 12th Annual Network and Distributed System Security Symposium, (Feb. 2005), 15 pages. |
| Williamson, Matthew M., “Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code”, ACSAC Conference, Las Vegas, NV, USA, (Dec. 2002), pp. 1-9. |
| Yuhei Kawakoya et al: “Memory behavior-based automatic malware unpacking in stealth debugging environment”, Malicious and Unwanted Software (Malware), 2010 5th International Conference on, IEEE, Piscataway, NJ, USA, Oct. 19, 2010, pp. 39-46, XP031833827, ISBN:978-1-4244-8-9353-1. |
| Zhang et al., The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation, Sep. 2009, IEEE 28th International Symposium on Reliable Distributed Systems, pp. 73-82. |
| Number | Date | Country | |
|---|---|---|---|
| 62784231 | Dec 2018 | US |