• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. A honeypot for arbitrary malware on USB storage devices
 
  • Details
  • Full
Options
2012
Conference Paper
Title

A honeypot for arbitrary malware on USB storage devices

Abstract
Malware is a serious threat for modern information technology. It is therefore vital to be able to detect and analyze such malicious software in order to develop contermeasures. Honeypots are a tool supporting that task - they collect malware samples for analysis. Unfortunately, existing honeypots concentrate on malware that spreads over networks, thus missing any malware that does not use a network for propagation. A popular network-independent technique for malware to spread is copying itself to USB flash drives. In this article we present Ghost, a new kind of honeypot for such USB malware. It detects malware by simulating a removable device in software, thereby tricking malware into copying itself to the virtual device. We explain the concept in detail and evaluate it using samples of wide-spread malware. We conclude that this new approach works reliably even for sophisticated malware, thus rendering the concept a promising new idea.
Author(s)
Pöplau, S.
Gassen, J.
Gerhards-Padilla, E.
Mainwork
7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012. Proceedings  
Conference
International Conference on Risks and Security of Internet and Systems (CRiSIS) 2012  
DOI
10.1109/CRISIS.2012.6378948
Language
English
Fraunhofer-Institut für Kommunikation, Informationsverarbeitung und Ergonomie FKIE  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024