Netinfo Security ›› 2015, Vol. 15 ›› Issue (9): 139-143.doi: 10.3969/j.issn.1671-1122.2015.09.032

• Orginal Article • Previous Articles     Next Articles

Research on Emulator-Based Sandbox Systems

Hang YU1,2,3(), Li-min LIU1,3, Neng GAO1,3, Hong-da LI1,3   

  1. 1.State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2.University of Chinese Academy of Sciences, Beijing 100049, China
    3.Data Assurance and Communication Security Research Center, Beijing 100093, China
  • Received:2015-07-15 Online:2015-09-30 Published:2015-11-13

Abstract:

Malware authors frustrate the dynamic analysis by the means of detecting whether the malware is executed in the sandbox. This method is called anti-virtualization technology. To defeat anti-virtualization, malware analysts try their bests to guarantee the consistency of real world and sandbox. Firstly, this paper analyses the semantic monitoring capacities, internals and security issues of existing sandbox systems, and then summarizes that emulator-based sandbox systems have advantages over others in isolation, full-system view and high monitoring efficiency. Also, we analyze the reason why emulator-based sandbox systems are not transparent enough.

Key words: sandbox, anti-virtualization, emulator

CLC Number: