Evaluation Models for the Resilience and Stealth of Software Protections and Malware
Evaluation Models for the Resilience and Stealth of Software Protections and Malware
Bilaterale Ausschreibung: Belgien
Disciplines
Computer Sciences (100%)
Keywords
-
Code Obfuscation,
Resilience,
Stealth,
Software Protection,
Malware,
Code Analysis
The project EMRESS (Evaluation Models for the Resilience and Stealth of Software Protections and Malware) deals with the problem of quantification of software protection techniques which are used both in commercial programs as well as malicious software (malware). Despite the fact that software protection techniques have been researched and used in practice since over two decades, no models for the strength of different protections exist. The lack of models is highly problematic for software vendors, because it prevents automated decision support for the optimal protection strategy for their software, as well as for malware analysts as no automated support for selecting the optimal malware analysis techniques given an incoming sample that needs to be analysed exists. With this project, we aim to improve this situation dramatically by developing quantitative models and analysis techniques for the strength of software protections based on the two properties resilience (strength of a protection against different analysis techniques) and stealth. The quantification of resilience will be achieved through novel models and metrics to predict which software representations attackers and their tools obtain after they used tools, heuristics, and assumptions to circumvent, to undo, or to neglect deployed protections. Stealth of software will be made quantifiable by developing novel techniques to identify and match components with (to some extent) known semantics in larger software packages. In both research areas comprehensive literature surveys will build the foundation of our research which describes the scientific knowledge of the arms race between software protection and code analysis in theory. Based on the results from the surveys, we derive properties of program code which can be used for (a) the quantification of the strength of applied protections and (b) in the context of malware the identification of its type. The results from this research will be used as the foundation for model generation. Next, prototype implementations of software protections and analysis concepts will be used in controlled experiments in order to verify our hypothesis in the model generation process. We will study how professional software penetration testers and malware analysts deal with different types of protections and compare the results with our survey works. The results of the project EMRESS will improve the scientific state-of-the-art in quantification of software protection techniques with respect to theory but also practice. Both companies wanting to protect benign software through obfuscation and other protections, as well as malware analysts will be able to use our results for selecting the best available technologies for their use cases. Additionally, we expect positive effects in the research field of software testing and software assurance.
The EMRESS project dealt with the quantification of software protection techniques, which are used in commercial programs as well as in malware. Although these techniques have been researched for a long time and are widely used in practice, until now no robust models for the strength of different protections existed. The lack of such models was highly problematic for malware analysts, who must determine a suitable analysis strategy depending on the protection techniques used by the malware. The project explored methodologies for determining the strength of the two key properties of a protection technique, stealth (covertness of the protection) and resilience (strength of the protection against automated undoing). To this end, we have created two comprehensive software frameworks that allow us to conduct empirical research on software protection and program analysis, and subsequently to derive predictive models for the strength of software protection techniques. To model stealth properties, we extracted patterns from a set of code complexity metrics and measured how uniquely they can be assigned to specific protection techniques. The existence of unique patterns reduces the stealth of a protection technique since it can be identified by the pattern. To quantify resilience properties, we determined the quality of reconstructions of basic program structures by a variety of analysis programs in the context of individual software protection techniques or the combination of techniques. The worse structures such as the control flow graph of a program can be reconstructed, the higher the resilience can be valued. Another research focus of the project was the identification of functionality in protected programs. We developed a novel methodology that uniquely identifies functionality based on its characteristic input-output behavior, independent of the exact implementation and the presence of obfuscation techniques. Combined, our frameworks serve as a decision support system for malware analysts by automatically identifying the protection techniques contained in potential malware, suggesting suitable analysis methods and tools, and automatically detecting the presence of typical malware functionality. Complementing the empirical research, the scientific state-of-the-art as well as methodological weaknesses in the research area of software protection were identified on the basis of more than 570 publications, and strategies to improve the status-quo were integrated in our frameworks. The results of the EMRESS project contribute significantly to the advancement of the scientific state-of-the-art in the field of software protection research, both in theory and in practice. Furthermore, we see positive effects for further research fields such as software testing and software assurance.
- Universität Wien - 100%
- Bjorn Sutter, Ghent University - Belgium
Research Output
- 8 Citations
- 9 Publications
- 1 Datasets & models
- 6 Scientific Awards
- 2 Fundings
-
2025
Title Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations DOI 10.3390/make7040125 Type Journal Article Author Felbauer P Journal Machine Learning and Knowledge Extraction -
2024
Title Modeling Obfuscation Stealth Through Code Complexity; In: Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II DOI 10.1007/978-3-031-54129-2_23 Type Book Chapter Publisher Springer Nature Switzerland -
2024
Title Evaluation Methodologies in Software Protection Research DOI 10.1145/3702314 Type Journal Article Author De Sutter B Journal ACM Computing Surveys -
2024
Title Obfuscation undercover: Unraveling the impact of obfuscation layering on structural code patterns DOI 10.1016/j.jisa.2024.103850 Type Journal Article Author Raubitzek S Journal Journal of Information Security and Applications -
2020
Title Compiling and Analyzing Open Source Malware for Research Purposes DOI 10.1109/icssa51305.2020.00013 Type Conference Proceeding Abstract Author Judt D Pages 32-37 -
2023
Title Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's GPT-3.5 on C Source Code DOI 10.5220/0012167000003555 Type Conference Proceeding Abstract Author Gramberger M Pages 7-19 -
2022
Title Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation DOI 10.1007/978-3-031-22295-5_15 Type Book Chapter Author Schrittwieser S Publisher Springer Nature Pages 273-291 -
2022
Title Meta-framework for Automating Static Malware Analysis Type Journal Article Author Kochberger P Journal ERCIM News 129 Pages 28-29 Link Publication -
2021
Title SoK: Automatic Deobfuscation of Virtualization-protected Applications DOI 10.1145/3465481.3465772 Type Conference Proceeding Abstract Author Kochberger P Pages 1-15
-
2025
Title Visiting staff (Prof. Francesco Mercaldo) Type Attracted visiting staff or user to your research group Level of Recognition Continental/International -
2007
Title ACM von checkmate Type Appointed as the editor/advisor to a journal or book series Level of Recognition National (any country) -
2024
Title ERCIM News Type Appointed as the editor/advisor to a journal or book series Level of Recognition Continental/International -
2023
Title Guest Editor Computer & Security Type Appointed as the editor/advisor to a journal or book series DOI 10.1016/j.cose.2023.103662 Level of Recognition Continental/International -
2023
Title Guest Editor Computer & Security Type Appointed as the editor/advisor to a journal or book series Level of Recognition Continental/International -
2021
Title Keynote at ICSSA 2021 Type Personally asked as a key note speaker to a conference Level of Recognition Continental/International
-
2020
Title Inference of Optimal Cyber Defense Strategies Type Other Start of Funding 2020 Funder Austrian Science Fund (FWF) -
2024
Title Christian Doppler Laboratory AsTra Type Research grant (including intramural programme) Start of Funding 2024 Funder Christian Doppler Research Association