论文标题

逃避恶意软件的WebAssembly多元化

WebAssembly Diversification for Malware Evasion

论文作者

Cabrera-Arteaga, Javier, Monperrus, Martin, Toady, Tim, Baudry, Benoit

论文摘要

WebAssembly已成为现代网络的关键部分,为浏览器中的JavaScript提供了更快的替代方案。在促进浏览器中的丰富应用程序的同时,这项技术也非常有效地开发加密夹克恶意软件。这触发了几种检测加密劫持恶意软件的方法的开发。但是,这些防御措施并未考虑使用攻击技术的可能性。本文探讨了自动二元多样化如何支持逃避WebAssembly加密夹式检测器的逃避。我们使用33个WebAssembly加密助工的数据集进行了实验,并评估了我们针对两个恶意软件探测器的逃避技术:Virustotal,一种通用检测器,以及WebAssembly特异性检测器Minos。我们的结果表明,我们的技术可以自动生成WebAssembly加密助理的变体,从而在90%的病例中逃避了检测器的Virustotal,而Minos为100%。我们的结果强调了元抗病毒和多种检测技术的重要性,并提供了新的见解,以了解哪些WebAssembly代码转换最适合恶意软件逃避。我们还表明,这些变体引入了有限的性能开销,使二元多样化成为逃避的有效技术。

WebAssembly has become a crucial part of the modern web, offering a faster alternative to JavaScript in browsers. While boosting rich applications in browser, this technology is also very efficient to develop cryptojacking malware. This has triggered the development of several methods to detect cryptojacking malware. However, these defenses have not considered the possibility of attackers using evasion techniques. This paper explores how automatic binary diversification can support the evasion of WebAssembly cryptojacking detectors. We experiment with a dataset of 33 WebAssembly cryptojacking binaries and evaluate our evasion technique against two malware detectors: VirusTotal, a general-purpose detector, and MINOS, a WebAssembly-specific detector. Our results demonstrate that our technique can automatically generate variants of WebAssembly cryptojacking that evade the detectors in 90% of cases for VirusTotal and 100% for MINOS. Our results emphasize the importance of meta-antiviruses and diverse detection techniques, and provide new insights into which WebAssembly code transformations are best suited for malware evasion. We also show that the variants introduce limited performance overhead, making binary diversification an effective technique for evasion.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源