Visible to the public Hiding Debuggers from Malware with Apate

TitleHiding Debuggers from Malware with Apate
Publication TypeConference Paper
Year of Publication2017
AuthorsShi, Hao, Mirkovic, Jelena
Conference NameProceedings of the Symposium on Applied Computing
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4486-9
Keywordsanti-debugging, Human Behavior, malware analysis, Metrics, privacy, pubcrawl, Resiliency
AbstractMalware analysis uses debuggers to understand and manipulate the behaviors of stripped binaries. To circumvent analysis, malware applies a variety of anti-debugging techniques, such as self-modifying, checking for or removing breakpoints, hijacking keyboard and mouse events, escaping the debugger, etc. Most state-of-the-art debuggers are vulnerable to these anti-debugging techniques. In this paper, we first systematically analyze the spectrum of possible anti-debugging techniques and compile a list of 79 attack vectors. We then propose a framework, called Apate, which detects and defeats each of these attack vectors, by performing: (1) just-in-time disassembling based on single-stepping, (2) careful monitoring of the debuggee's execution and, when needed, modification of the debuggee's states to hide the debugger's presence. We implement Apate as an extension to WinDbg and extensively evaluate it using five different datasets, with known and new malware samples. Apate outperforms other debugger-hiding technologies by a wide margin, addressing 58+-465+ more attack vectors.
URLhttp://doi.acm.org/10.1145/3019612.3019791
DOI10.1145/3019612.3019791
Citation Keyshi_hiding_2017