Skip to main content

MBR Image Automation Analysis Techniques Utilizing Emulab

  • Conference paper
  • First Online:
Information Science and Applications 2017 (ICISA 2017)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 424))

Included in the following conference series:

Abstract

Virtual environment is frequently used for malware analysis. To hide their behavior, malware began to adopt virtual environment detection techniques. One of trickiest things when analyzing malware on real systems is that the operating system became unbootable due to the crash of partition and boot loader stored in the first sector of hard disk called the master boot record (MBR). It is quite time consuming to extract its MBR image from the crashed hard disk, so running malware on real system is usually considered as the last resort. In this research, we proposed a malware analysis system utilizing Emulab to extract crashed MBR images very easily.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 34319
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 42899
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
JPY 42899
Price includes VAT (Japan)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Internet Security Threat Report, Vol. 21, Symantec Corp., April 2016. https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf

  2. Internet Security Threat Report, Vol. 20, Symantec Corp., April 2015. https://www.symantec.com/content/dam/symantec/docs/reports/istr-20-2015-en.pdf

  3. Kirat, D., Vigna, G., Kruegel, C.: Barecloud: bare-metal analysis-based evasive malware detection. In: Proceedings of the 23rd USENIX Security Symposium, pp. 287–301, August 2014

    Google Scholar 

  4. Kirat, D., Vigna, G.: MalGene: automation extraction of malware analysis evasion signa-ture. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 769–780, October 2015

    Google Scholar 

  5. Utah Emulab, Network Emulation Testbed Home. https://www.emulab.net/

  6. Lee, M., Seok, W.: Research on the trend of utilizing emulab as cyber security research framework. J. Korea Inst. Inform. Secur. Cryptology 23, 1169–1180 (2013)

    Article  Google Scholar 

  7. Lee, M., Seok, W.: Research on utilizing emulab for malware analysis. J. Korea Inst. Inform. Secur. Cryptology 26, 117–124 (2016)

    Article  Google Scholar 

  8. Pafish. https://github.com/a0rtega/pafish

  9. VMware Virtualization, VMware. https://www.vmware.com/

  10. dd. https://en.wikipedia.org/wiki/Dd_(Unix)

  11. sshpass. http://manpages.ubuntu.com/manpages/trusty/man1/sshpass.1.html

  12. Netwide Assembler. http://www.nasm.us/

  13. KISTI Emulab, Network Emulation Testbed Home. https://www.emulab.kreonet.net/

  14. South Korea cyberattack. https://en.wikipedia.org/wiki/2013_South_Korea_cyberattack

  15. Dissecting Operation Troy: Cyberespionage in South Korea, McAfee. http://www.mcafee.com/kr/resources/white-papers/wp-dissecting-operation-troy.pdf

Download references

Acknowledgments

This research is financially supported by 2016 Hannam University Research Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manhee Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Song, G., Lee, M. (2017). MBR Image Automation Analysis Techniques Utilizing Emulab. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4154-9_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4153-2

  • Online ISBN: 978-981-10-4154-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics