Hidden Treasure

Presented at Summercon 2017, June 24, 2017, 11 a.m. (50 minutes).

A binary's call graph is a treasure trove, that has been vastly neglected in threat research. Dozens of features can be extracted from a call graph, which for once are remarkably useful in threat detection, but also, they can be leveraged for more advanced binary classification and authorship attribution research. The basic theorem goes, that the design of a malicious application is resource intensive, thus is likely to stay the same throughout different pieces of malware written by the same authors. In other words, a keylogging module will always be the same keylogging module, no matter where it is being copy pasted to. Being able to formulate such statements as features, thus, is a powerful capability. Of course though, the design of resilient features which preserve this kind of information is challenging and numerous measures can be taken to destroy them.

In this talk it will be examined, how changes induced by a standard compiler affect the call graphs of malicious code, effectively destroying advanced feature sets; and how features can be lifted up to a more abstract level where they can still preserve the base information.


Presenters:

  • Marion Marschalek
    Marion takes things apart, with a passion. She works as an independant researcher and focusses on targeted threats and incident response cases. Marion started her career within the anti-virus industry and also worked on advanced threat protection systems where she built a thorough understanding of how threats and protection systems work and where both fail, only occasionally. Also, Marion teaches malware analysis at University of Applied Sciences St. Pölten and frequently contributes to articles and papers. She has spoken at international conferences around the globe, among others Blackhat, ReCon, SyScan, hack.lu and Troopers. Marion organizes an annual and free reverse engineering bootcamp for women named BlackHoodie. @pinkflawd

Links:

Similar Presentations: