Malware, Encryption, and Rerandomization - Everything is Under Attack
Journal article, Peer reviewed
MetadataShow full item record
Original versionLecture Notes in Computer Science. 2017, 233-251. 10.1007/978-3-319-61273-7_12
A malware author constructing malware wishes to infect a specific location in the network. The author will then infect n initial nodes with n different variations of his malicious code. The malware continues to infect subsequent nodes in the network by making similar copies of itself. An analyst defending M nodes in the network observes N infected nodes with some malware and wants to know if any sample is targeting any of his nodes. To reduce his work, the analyst need only look at unique malware samples. We show that by encrypting the malware payload and using rerandomization to replicate malware, we can make the N observed malware samples distinct and increase the analyst’s work factor substantially.