Enabling Internet Malware Investigation and Defense Using Virtualization

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=gJSiLRVZzO8



Duration: 1:04:19
37 views
1


Internet malware remains a top threat to the Internet today, as clearly demonstrated by the recent large-scale Internet worm outbreaks (e.g., the MSBlaster worm in 2003 and the Sasser worm in 2004). Moreover, every new wave of outbreak reveals the rapid evolution of Internet malware in terms of speed, virulence, and sophistication. Unfortunately, our capability of investigating and defending against Internet malware has not seen the same pace of advancement since the Code Red episode of mid-2001. In this talk, I will present my research work on an integrated, virtualization-based framework for malware investigation and defense. First, I will introduce a virtualization-based honeyfarm and reverse honeyfarm architecture, called Collapsar, that operates as the front-end trap of various malware attacks. Collapsar is, to the best of our knowledge, the first honeyfarm implementation that enables centralized management of honeypots while still preserving a (virtual) distributed presence. Next, I will present vGround, the back-end virtual playground of captured worms and malware. vGround enables destruction-oriented experiments with real-world malware that were previously expensive, inefficient, or even impossible to conduct. In particular, based on the dynamic infection behavior of real worms revealed by vGround, we have defined a novel behavioral footprinting model for worm characterization and identification, which complements the state-of-the-art content-based signature approach. Our recent enhancement to vGround is a provenance-aware logging mechanism (called process coloring) that achieves higher efficiency and accuracy than existing systems in tracing malware break-in and contaminations. Finally, I will briefly describe my latest work on virtualizing the run-time environment to defend against code-injection attacks by Internet malware, as well as my future research plan.




Other Videos By Microsoft Research


2016-09-06Tractable Learning of Structured Prediction Models
2016-09-06Future Hype: The Myths of Technology Change
2016-09-06Improving Packet Delivery Efficiency Using Multi-Radio Diversity in Wireless LANs
2016-09-06Algorithmic Foundations of P2P and Wireless Networks
2016-09-06Semi-unsupervised learning of taxonomic and non-taxonomic relationships from the web
2016-09-06The Weather Makers: How Man is Changing the Climate and What it Means for Life on Earth
2016-09-06Touched with Light: Scanned beams display or capture information at video rates
2016-09-06Internet Background Radiation
2016-09-06Understanding and Improving Wireless Networks
2016-09-06SAFECode: A Platform for Developing Reliable Software in Unsafe Languages
2016-09-06Enabling Internet Malware Investigation and Defense Using Virtualization
2016-09-06Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
2016-09-06Approximate inference techniques for optimal design in self-assembly and automated programming
2016-09-06Machine Learning Methods for Structured and Collective Classification
2016-09-06Communication Technology: Interruption and Overload
2016-09-06ParaEval: Using Paraphrases to Improve Machine Translation and Summarization Evaluations
2016-09-06Rethinking Processor and System Architecture
2016-09-06Crashing the Gate: Netroots, Grassroots, and the Rise of People-Powered Politics
2016-09-06Improving Routing Scalability through Mobile Geographic Hashing in MANETs
2016-09-06The Semantic Web: Myth and Reality
2016-09-06Learnable Similarity Functions and Their Applications in Information Integration and Clustering



Tags:
microsoft research