Architecture for analyzing Potentially Unwanted Applications
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.advisor | Antikainen, Markku | |
dc.contributor.author | Geniola, Alberto | |
dc.contributor.school | Perustieteiden korkeakoulu | fi |
dc.contributor.supervisor | Aura, Tuomas | |
dc.date.accessioned | 2016-11-02T09:31:20Z | |
dc.date.available | 2016-11-02T09:31:20Z | |
dc.date.issued | 2016-10-27 | |
dc.description.abstract | The spread of potentially unwanted programs (PUP) and its supporting pay par install (PPI) business model have become relevant issues in the IT security area. While PUPs may not be explicitly malicious, they still represent a security hazard. Boosted by PPI companies, PUP software evolves rapidly. Although manual analysis represents the best approach for distinguishing cleanware from PUPs, it is inapplicable to the large amount of PUP installers appearing each day. To challenge this fast evolving phenomenon, automatic analysis tools are required. However, current automated malware analisyis techniques suffer from a number of limitations, such as the inability to click through PUP installation processes. Moreover, many malware analysis automated sandboxes (MSASs) can be detected, by taking advantage of artifacts affecting their virtualization engine. In order to overcome those limitations, we present an architectural design for implementing a MSAS mainly targeting PUP analysis. We also provide a cross-platform implementation of the MSAS, capable of running PUP analysis in both virtual and bare metal environments. The developed prototype has proved to be working and was able to automatically analyze more that 480 freeware installers, collected by the three top most ranked freeware websites, such as cnet.com, filehippo.com and softonic.com. Eventually, we briefly analyze collected data and propose a first strategy for detecting PUPs by inspecting intercepted HTTP traffic. | en |
dc.format.extent | 149+8 | |
dc.format.mimetype | application/pdf | en |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/23262 | |
dc.identifier.urn | URN:NBN:fi:aalto-201611025363 | |
dc.language.iso | en | en |
dc.programme | Master’s Programme in Computer, Communication and Information Sciences | fi |
dc.programme.major | Computer Science | fi |
dc.programme.mcode | SCI3068 | fi |
dc.rights.accesslevel | openAccess | |
dc.subject.keyword | PUP | en |
dc.subject.keyword | security | en |
dc.subject.keyword | PUA | en |
dc.subject.keyword | MSAS | en |
dc.subject.keyword | potentially unwanted application | en |
dc.title | Architecture for analyzing Potentially Unwanted Applications | en |
dc.type | G2 Pro gradu, diplomityö | fi |
dc.type.okm | G2 Pro gradu, diplomityö | |
dc.type.ontasot | Master's thesis | en |
dc.type.ontasot | Diplomityö | fi |
dc.type.publication | masterThesis | |
local.aalto.idinssi | 54895 | |
local.aalto.openaccess | yes |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- master_Geniola_Alberto_2016.pdf
- Size:
- 9.72 MB
- Format:
- Adobe Portable Document Format