Architecture for analyzing Potentially Unwanted Applications

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.advisorAntikainen, Markku
dc.contributor.authorGeniola, Alberto
dc.contributor.schoolPerustieteiden korkeakoulufi
dc.contributor.supervisorAura, Tuomas
dc.date.accessioned2016-11-02T09:31:20Z
dc.date.available2016-11-02T09:31:20Z
dc.date.issued2016-10-27
dc.description.abstractThe spread of potentially unwanted programs (PUP) and its supporting pay par install (PPI) business model have become relevant issues in the IT security area. While PUPs may not be explicitly malicious, they still represent a security hazard. Boosted by PPI companies, PUP software evolves rapidly. Although manual analysis represents the best approach for distinguishing cleanware from PUPs, it is inapplicable to the large amount of PUP installers appearing each day. To challenge this fast evolving phenomenon, automatic analysis tools are required. However, current automated malware analisyis techniques suffer from a number of limitations, such as the inability to click through PUP installation processes. Moreover, many malware analysis automated sandboxes (MSASs) can be detected, by taking advantage of artifacts affecting their virtualization engine. In order to overcome those limitations, we present an architectural design for implementing a MSAS mainly targeting PUP analysis. We also provide a cross-platform implementation of the MSAS, capable of running PUP analysis in both virtual and bare metal environments. The developed prototype has proved to be working and was able to automatically analyze more that 480 freeware installers, collected by the three top most ranked freeware websites, such as cnet.com, filehippo.com and softonic.com. Eventually, we briefly analyze collected data and propose a first strategy for detecting PUPs by inspecting intercepted HTTP traffic.en
dc.format.extent149+8
dc.format.mimetypeapplication/pdfen
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/23262
dc.identifier.urnURN:NBN:fi:aalto-201611025363
dc.language.isoenen
dc.programmeMaster’s Programme in Computer, Communication and Information Sciencesfi
dc.programme.majorComputer Sciencefi
dc.programme.mcodeSCI3068fi
dc.rights.accesslevelopenAccess
dc.subject.keywordPUPen
dc.subject.keywordsecurityen
dc.subject.keywordPUAen
dc.subject.keywordMSASen
dc.subject.keywordpotentially unwanted applicationen
dc.titleArchitecture for analyzing Potentially Unwanted Applicationsen
dc.typeG2 Pro gradu, diplomityöfi
dc.type.okmG2 Pro gradu, diplomityö
dc.type.ontasotMaster's thesisen
dc.type.ontasotDiplomityöfi
dc.type.publicationmasterThesis
local.aalto.idinssi54895
local.aalto.openaccessyes

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
master_Geniola_Alberto_2016.pdf
Size:
9.72 MB
Format:
Adobe Portable Document Format