human-computer decision systems for cybersecurity · static analysis of a large scale malware repo....

24
SEI Research Review 2016 Human-Computer Decision Systems for Cybersecurity © 2016 Carnegie Mellon University [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Human-Computer Decision Systems for Cybersecurity N. VanHoudnos, S. Moon, D. French, Brian Lindauer* P. Jansen, J. Carbonell, C. Hines, W. Casey

Upload: others

Post on 03-Aug-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

1Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Human-Computer Decision Systems for Cybersecurity© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

Human-Computer Decision Systems for CybersecurityN. VanHoudnos, S. Moon, D. French, Brian Lindauer* P. Jansen, J. Carbonell, C. Hines, W. Casey

Page 2: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

2Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Copyright 2016 Carnegie Mellon UniversityThis material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.

Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense.

NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.

[Distribution Statement A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.

This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at [email protected].

CERT® is a registered mark of Carnegie Mellon University.

DM-0004098

Page 3: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

3Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

The Problem – Malware Classification

Art

ifac

ts

Year

Total Artifacts Over Time• Task: Given an exemplar, find

other malware artifacts of the same class (family, behavior, etc.) in our existing catalog.

• Problem: Diversity and volume of incoming malware

• Human analysis is far too expensive

• Can’t run all tools on all samples

• Malware variation is unpredictable in mode or frequency

• “I’ll know it when I see it” hard to quantify

Page 4: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

4Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Features for Malware Classification

• Features from static analysis• Decompositional Techniques

• *Section hashes• Resource hashes

• Interpretive Techniques• Function hashes• *Mnemonic class histograms• *Import address table (IAT)

hashes

• Features from runtime analysis• Host-based

• *System call traces / call graphs• Filesystem operations• Registry operations

• Network-based

* Explored in this project

Page 5: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

5Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

First Idea: Active LearningActive*Learning

4

[Settles,&2011][Settles 2011]

Page 6: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

6Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Traditional Active Learning (Uncertainty-Based)

Page 7: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

7Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Simulated Active Learning

Learn a difficult task with less training data.

Page 8: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

8Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Dynamic Proactive Learning (DPAL)• Learned from past history• Updated periodically

• Uncertainty• Density• Expertise• …

DPAL is a mathematical framework to support active learning using many simultaneous criteria.

Page 9: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

9Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

A Proxy Task

For validation, we need a learnable task and ground truth.

To stay close to the real data, we projected the samples into a four dimensional PCA space, and mapped those dimensions onto either stick figures or Chernoff faces.

Page 10: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

10Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Creature Classification on AMT

Page 11: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

11Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Creature Classification on AMT

Page 12: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

12Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

DPAL Only Helps In Simulation

DPAL with Real Users

• Entropy (very simple!) wins.• Runtime features are too

discriminative for DPAL to gain an advantage.

DPAL in Simulation

Page 13: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

13Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Result: A framework for dynamically re-balancing the selection of points for labeling, extending and generalizing existing active learning methods.

(But it doesn’t help on our task.)

Page 14: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

14Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Expert Labels vs. Turker Labels

• “Ground Truth” shows an SVM trained with expert ground truth labels.

• ”Turkers Avg” trains the classifier with layperson labels instead.

Page 15: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

15Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

• The difficulty of a given stimulus is consistent across runs.

Results

Stick figuresare harder.

Page 16: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

16Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Result: Simple visualizations can allow even completely untrained people to differentiate malware families.

Page 17: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

17Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Questions:• If visualizations are that effective for

laypeople, can we use them to help experts?

• What if we could only use cheaper static features?

Page 18: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

18Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Data• Approximately 50k suspicious binaries from Virus Total collected in January

2016.• No ground truth – individual reverse engineering as needed

Two kinds of static analysis features computed: • Cheap, broad brush features

• Entry-Point (EP) section hash• Import Address Table (IAT) hash

• Expensive, fine grained features from disassembly • Mnemonic counts per function ( add, mov, jmp, and others)• Approximate sequence of mnemonics per file

Static Analysis of a Large Scale Malware Repo

Page 19: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

19Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

How Good is Your Cheap Feature?

PCA (for comparison only) t-SNE

• 20k observations of 545 mnemonic counts reduced to two dimensions.• Red points are a specific IAT hash of interest. • This IAT hash (cheap) is well localized in t-SNE space (expensive)• Knowing this IAT hash is likely good enough to define this family.• Expert analysis concludes this is a single family.

Page 20: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

20Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Cheap Can Be Noisy… A Different IAT HashEmbedding reduces the number cases to reverse engineer and increases confidence.

Current analysis methods conclude this IAT hash is one family. t-SNE + IAT = family would have cost less.

Page 21: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

21Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Result: t-SNE-based visualizations paired with IAT hashes greatly reduce the number of manual binary analyses required to understand new groups of binaries.

Page 22: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

22Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Future workOperationalize this proof-of-concept• Improve quality of t-SNE embedding to better localize groups• Implement a predictive model to embed binaries as they stream in• Measure if this tool increases effectiveness of early career reverse engineers.

Add dynamic, runtime features as a third level of visualization. • Section hashing -> t-SNE static analysis -> t-SNE runtime features• Learn when to stop, and when to move on to the next level. • Increase confidence in findings from prior levels.

Page 23: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

23Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

• Machine learning and human analysts provide complementary capabilities in malware analysis.

• Visualization of runtime features is surprisingly powerful – so much so that laypeople can label malware.

• Using more advanced dimensionality reduction, we can combine IAT hashes and t-SNE over mnemonic counts to achieve an order-of-magnitude reduction in analyst workload.

Conclusions

Page 24: Human-Computer Decision Systems for Cybersecurity · Static Analysis of a Large Scale Malware Repo. 19 Human-Computer Decision Systems in Cybersecurity October 26, 2016 ... Operationalize

24Human-Computer Decision Systems in CybersecurityOctober 26, 2016© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

SEI Research Review 2016

Human-Computer Decision Systems for Cybersecurity© 2016 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution.

Questions?Brian Lindauer, CERT [email protected]