Skip to main content
Article
Dynamic Spyware Analysis
Department of Electrical and Computer Engineering
  • Manuel Egele, Technical University Vienna
  • Christopher Kruegel, Technical University Vienna
  • Engin Kirda, Technical University Vienna
  • Heng Yin, Carnegie Mellon University
  • Dawn Song, Carnegie Mellon University
Date of Original Version
1-1-2007
Type
Conference Proceeding
Rights Management
http://portal.acm.org/citation.cfm?id=1364403#abstract
Abstract or Description

Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing habits, and steals their passwords. Current anti-spyware tools operate in a way similar to traditional virus scanners. That is, they check unknown programs against signatures associated with known spyware instances. Unfortunately, these techniques cannot identify novel spyware, require frequent updates to signature databases, and are easy to evade by code obfuscation.

In this paper, we present a novel dynamic analysis approach that precisely tracks the flow of sensitive information as it is processed by the web browser and any loaded browser helper objects. Using the results of our analysis, we can identify unknown components as spyware and provide comprehensive reports on their behavior. The techniques presented in this paper address limitations of our previouswork on spyware detection and significantly improve the quality and richness of our analysis. In particular, our approach allows a human analyst to observe the actual flows of sensitive data in the system. Based on this information, it is possible to precisely determine which sensitive data is accessed and where this data is sent to. To demonstrate the effectiveness of the detection and the comprehensiveness of the generated reports, we evaluated our system on a substantial body of spyware and benign samples.

Citation Information
Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, et al.. "Dynamic Spyware Analysis" (2007)
Available at: http://works.bepress.com/heng_yin/5/