All Projects → mbrengel → memscrimper

mbrengel / memscrimper

Licence: BSD-2-Clause license
Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"

Programming Languages

C++
36643 projects - #6 most used programming language
python
139335 projects - #7 most used programming language
CMake
9771 projects

Projects that are alternatives of or similar to memscrimper

Pafish
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Stars: ✭ 2,026 (+8004%)
Mutual labels:  sandbox, malware, malware-research
Mba
Malware Behavior Analyzer
Stars: ✭ 125 (+400%)
Mutual labels:  sandbox, malware, forensics
Drakvuf Sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Stars: ✭ 384 (+1436%)
Mutual labels:  sandbox, malware, malware-research
malware api class
Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers
Stars: ✭ 134 (+436%)
Mutual labels:  sandbox, malware
rhino
Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
Stars: ✭ 49 (+96%)
Mutual labels:  sandbox, malware
VX-API
Collection of various malicious functionality to aid in malware development
Stars: ✭ 904 (+3516%)
Mutual labels:  malware, malware-research
See
Sandboxed Execution Environment
Stars: ✭ 770 (+2980%)
Mutual labels:  sandbox, malware-research
ioc-fanger
Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (+88%)
Mutual labels:  malware, malware-research
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+1024%)
Mutual labels:  malware, malware-research
Malware-Zoo
Hashes of infamous malware
Stars: ✭ 18 (-28%)
Mutual labels:  malware, malware-research
bluepill
BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+276%)
Mutual labels:  malware, malware-research
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+756%)
Mutual labels:  malware, malware-research
binlex
A Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+1112%)
Mutual labels:  malware, malware-research
DFIR Resources REvil Kaseya
Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (+588%)
Mutual labels:  malware, forensics
Norimaci
Norimaci is a simple and lightweight malware analysis sandbox for macOS
Stars: ✭ 37 (+48%)
Mutual labels:  sandbox, malware
unprotect
Unprotect is a python tool for parsing PE malware and extract evasion techniques.
Stars: ✭ 75 (+200%)
Mutual labels:  sandbox, malware
Docker Cuckoo
Cuckoo Sandbox Dockerfile
Stars: ✭ 289 (+1056%)
Mutual labels:  sandbox, malware
yara
Malice Yara Plugin
Stars: ✭ 27 (+8%)
Mutual labels:  malware, malware-research
awesome-executable-packing
A curated list of awesome resources related to executable packing
Stars: ✭ 720 (+2780%)
Mutual labels:  malware, malware-research
Anti-Debugging
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+1088%)
Mutual labels:  malware, malware-research

MemScrimper

This repository contains the code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps". Please note that in its current state, the code is a PoC and not a full-fledged production-ready application.

Abstract

MemScrimper is a a novel methodology to compress memory dumps of malware sandboxes. MemScrimper is built on the observation that sandboxes always start at the same system state (i.e., a sandbox snapshot) to analyze malware. Therefore, memory dumps taken after malware execution inside the same sandbox are substantially similar to each other, which we can use to only store the differences introduced by the malware itself. Technically, we compare the pages of those memory dumps against the pages of a reference memory dump taken from the same sandbox and then deduplicate identical or similar pages accordingly. MemScrimper increases data compression ratios by up to 3894.74% compared to standard compression utilities such as 7zip, and reduces compression and decompression times by up to 72.48% and 41.44, respectively. Furthermore, MemScrimper's internal storage allows to perform analyses (e.g., signature matching) on compressed memory dumps more efficient than on uncompressed dumps. MemScrimper thus significantly increases the retention time of memory dumps and makes longitudinal analysis more viable, while also improving efficiency.

Paper

The paper is available here. You can cite it with the following BibTeX entry:

@inproceedings{MemScrimper,
  author    = {Michael Brengel and Christian Rossow},
  title     = {{\textsc{MemScrimper}: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps}},
  booktitle = {Proceedings of the Conference on Detection of Intrusions and Malware, and Vulnerability Assessment~(DIMVA)},
  year      = {2018}
}

Interested in more of our research?

Come visit us.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].