A novel dynamic analysis infrastructure to instrument untrusted execution flow across user-kernel spaces

9Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Code instrumentation and hardware based event trapping are two primary approaches used in dynamic malware analysis systems. In this paper, we propose a new approach called Execution Flow Instrumentation (EFI) where the analyzer execution flow is interleaved with the target flow in user- and kernel-mode, at junctures flexibly chosen by the analyzer at runtime. We also propose OASIS as the system infrastructure to realize EFI with virtues of the current two approaches, however without their drawbacks. Despite being securely and transparently isolated from the target, the analyzer introspects and controls it in the same native way as instrumentation code. We have implemented a prototype of OASIS and rigorously evaluated it with various experiments including performance and anti-analysis benchmark tests. We have also conducted two EFI case studies. The first is a cross-space control flow tracer and the second includes two EFI tools working in tandem with Google Syzkaller. One tool makes a dynamic postmortem analysis according to a kernel crash report; and the other explores the behavior of a malicious kernel space device driver which evades Syzkaller logging. The studies show that EFI analyzers are well-suited for fine-grained on-demand dynamic analysis upon a malicious thread in user or kernel mode. It is easy to develop agile EFI tools as they are user-space programs.

Author supplied keywords

References Powered by Scopus

Pin: Building customized program analysis tools with dynamic instrumentation

1381Citations
N/AReaders
Get full text

Toward automated dynamic malware analysis using CWSandbox

601Citations
N/AReaders
Get full text

Ether: Malware analysis via hardware virtualization extensions

565Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts

7Citations
N/AReaders
Get full text

Rope: Covert Multi-process Malware Execution with Return-Oriented Programming

7Citations
N/AReaders
Get full text

Designing Robust API Monitoring Solutions

5Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Hong, J., & Ding, X. (2021). A novel dynamic analysis infrastructure to instrument untrusted execution flow across user-kernel spaces. In Proceedings - IEEE Symposium on Security and Privacy (Vol. 2021-May, pp. 1902–1918). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SP40001.2021.00024

Readers over time

‘20‘21‘22‘23036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

64%

Professor / Associate Prof. 3

27%

Researcher 1

9%

Readers' Discipline

Tooltip

Computer Science 10

91%

Engineering 1

9%

Article Metrics

Tooltip
Social Media
Shares, Likes & Comments: 191

Save time finding and organizing research with Mendeley

Sign up for free
0