dc.contributor.advisor | Saltaformaggio, Brendan | |
dc.contributor.author | Kilger, Fabian | |
dc.date.accessioned | 2020-09-08T12:49:04Z | |
dc.date.available | 2020-09-08T12:49:04Z | |
dc.date.created | 2020-08 | |
dc.date.issued | 2020-07-28 | |
dc.date.submitted | August 2020 | |
dc.identifier.uri | http://hdl.handle.net/1853/63696 | |
dc.description.abstract | While there has been significant progress in automated malware analysis, the focus of prior work has been mostly on programs written in C/C++. Advanced malware such as the Triton malware, however, also employ Python which imposes additional challenges to the automated malware analysis. Motivated by this example, we design and implement a concolic execution framework that is capable of extracting models of the targeted industrial control systems (ICS) based on the Python malware's communication with the system. Our approach first transforms the Python malware to C and then utilizes
a symbolic execution engine to analyze the resulting C code. We prove the functionality of our framework on a set of test programs and evaluate it on two ICS-related samples including the Triton malware. Finally, we discuss how the results of our analysis can be used to identify potentially targeted ICS of a Python malware. | |
dc.format.mimetype | application/pdf | |
dc.language.iso | en_US | |
dc.publisher | Georgia Institute of Technology | |
dc.subject | Malware | |
dc.subject | Symbolic execution | |
dc.subject | Concolic execution | |
dc.subject | Dynamic binary insrumentation | |
dc.subject | Industrial control system | |
dc.subject | Triton | |
dc.subject | Trisis | |
dc.subject | Search strategy | |
dc.title | Extracting ICS models from malware via concolic analysis | |
dc.type | Thesis | |
dc.description.degree | M.S. | |
dc.contributor.department | Computer Science | |
thesis.degree.level | Masters | |
dc.contributor.committeeMember | Beyah, Raheem | |
dc.contributor.committeeMember | Pearce, Paul | |
dc.date.updated | 2020-09-08T12:49:04Z | |