%0 Conference Proceedings %T Redirecting Malware’s Target Selection with Decoy Processes %+ Oakland University %A Sutton, Sara %A Michilli, Garret %A Rrushi, Julian %Z Part 7: Malware %< avec comité de lecture %( Lecture Notes in Computer Science %B 33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) %C Charleston, SC, United States %Y Simon N. Foley %I Springer International Publishing %3 Data and Applications Security and Privacy XXXIII %V LNCS-11559 %P 398-417 %8 2019-07-15 %D 2019 %R 10.1007/978-3-030-22479-0_21 %K Malware interception %K Decoy processes %K Operating system kernel %K Deep learning %Z Computer Science [cs]Conference papers %X Honeypots attained the highest accuracy in detecting malware among all proposed anti-malware approaches. Their strength lies in the fact that they have no activity of their own, therefore any system or network activity on a honeypot is unequivocally detected as malicious. We found that the very strength of honeypots can be turned into their main weakness, namely the absence of activity can be leveraged to easily detect a honeypot. To that end, we describe a practical approach that uses live performance counters to detect a honeypot, as well as decoy I/O on machines in production. To counter this weakness, we designed and implemented the existence of decoy processes through operating system (OS) techniques that make safe interventions in the OS kernel. We also explored deep learning to characterize and build the performance fingerprint of a real process, which is then used to support its decoy counterpart against active probes by malware. We validated the effectiveness of decoy processes as integrated with a decoy Object Linking and Embedding for Process Control (OPC) server, and thus discuss our findings in the paper. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-02384597/document %2 https://inria.hal.science/hal-02384597/file/480962_1_En_21_Chapter.pdf %L hal-02384597 %U https://inria.hal.science/hal-02384597 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-11559