Annual Computer Security Applications Conference (ACSAC) 2021

Full Program »

Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification

The Internet of Things (IoT) is constituted of devices that are exponentially growing in number and in complexity. They use numerous customized firmware and hardware, without taking into consideration security issues, which make them a target for cybercriminals, especially malware authors. We will present a novel approach of using side channel information to identify the kinds of threats that are targeting the device. Using our approach, a malware analyst is able to obtain precise knowledge about malware type and identity, even in the presence of obfuscation techniques which may prevent static or symbolic binary analysis. We recorded 100,000 measurement traces from an IoT device infected by various in-the-wild malware samples and realistic benign activity. Our method does not require any modification on the target device. Thus, it can be deployed independently from the resources available without any overhead. Moreover, our approach has the advantage that it can hardly be detected and evaded by the malware authors. In our experiments, we were able to predict three generic malware types (and one benign class) with an accuracy of 99.89%. Even more, our results show that we are able to classify altered malware samples with unseen obfuscation techniques during the training phase, and to determine what kind of obfuscations were applied to the binary, which makes our approach particularly useful for malware analysts.

Duy-Phuc Pham
Univ Rennes, Inria, CNRS, IRISA, France

Damien Marion
Univ Rennes, Inria, CNRS, IRISA, France

Matthieu Mastio
Univ Rennes, Inria, CNRS, IRISA, France

Annelie Heuser
Univ Rennes, Inria, CNRS, IRISA, France

Paper (ACM DL)

Slides

Video

 



Powered by OpenConf®
Copyright©2002-2021 Zakon Group LLC