search query: @supervisor Aura, Tuomas / total: 122
reference: 4 / 122
« previous | next »
Author:Geniola, Alberto
Title:Architecture for analyzing Potentially Unwanted Applications
Publication type:Master's thesis
Publication year:2016
Pages:149+8      Language:   eng
Department/School:Perustieteiden korkeakoulu
Main subject:Computer Science   (SCI3068)
Supervisor:Aura, Tuomas
Instructor:Antikainen, Markku
Electronic version URL: http://urn.fi/URN:NBN:fi:aalto-201611025363
Location:  
Keywords:PUP
Security
PUA
MSAS
Potentially Unwanted Application
Abstract (eng):The spread of potentially unwanted programs (PUP) and its supporting pay par install (PPI) business model have become relevant issues in the IT security area.
While PUPs may not be explicitly malicious, they still represent a security hazard.
Boosted by PPI companies, PUP software evolves rapidly.
Although manual analysis represents the best approach for distinguishing cleanware from PUPs, it is inapplicable to the large amount of PUP installers appearing each day.
To challenge this fast evolving phenomenon, automatic analysis tools are required.
However, current automated malware analisyis techniques suffer from a number of limitations, such as the inability to click through PUP installation processes.
Moreover, many malware analysis automated sandboxes (MSASs) can be detected, by taking advantage of artifacts affecting their virtualization engine.
In order to overcome those limitations, we present an architectural design for implementing a MSAS mainly targeting PUP analysis.
We also provide a cross-platform implementation of the MSAS, capable of running PUP analysis in both virtual and bare metal environments.
The developed prototype has proved to be working and was able to automatically analyze more that 480 freeware installers, collected by the three top most ranked freeware websites, such as cnet.com, filehippo.com and softonic.com.
Eventually, we briefly analyze collected data and propose a first strategy for detecting PUPs by inspecting intercepted HTTP traffic.
ED:2016-11-13
INSSI record number: 54895
+ add basket
« previous | next »
INSSI