GPU-assisted malware

Giorgos Vasiliadis, Michalis Polychronakis, Sotiris Ioannidis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Abstract

Malware writers constantly seek new methods to obfuscate their code so as to evade detection by virus scanners. Two code-armoring techniques that pose significant challenges to existing malicious-code detection and analysis systems are unpacking and run-time polymorphism. In this paper, we demonstrate how malware can increase its robustness against detection by taking advantage of the ubiquitous Graphics Processing Unit. We have designed and implemented unpacking and run-time polymorphism for a GPU, and tested them using existing graphics hardware. We also discuss how upcoming GPU features can be utilized to build even more robust, evasive, and functional malware.

Original languageEnglish
Title of host publicationProceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010
Pages1-6
Number of pages6
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event5th International Conference on Malicious and Unwanted Software, Malware 2010 - Nancy, France
Duration: 19 Oct 201020 Oct 2010

Other

Other5th International Conference on Malicious and Unwanted Software, Malware 2010
CountryFrance
CityNancy
Period19/10/1020/10/10

Fingerprint

Polymorphism
Viruses
Hardware
Graphics processing unit
Malware

ASJC Scopus subject areas

  • Software

Cite this

Vasiliadis, G., Polychronakis, M., & Ioannidis, S. (2010). GPU-assisted malware. In Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010 (pp. 1-6). [5665801] https://doi.org/10.1109/MALWARE.2010.5665801

GPU-assisted malware. / Vasiliadis, Giorgos; Polychronakis, Michalis; Ioannidis, Sotiris.

Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010. 2010. p. 1-6 5665801.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vasiliadis, G, Polychronakis, M & Ioannidis, S 2010, GPU-assisted malware. in Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010., 5665801, pp. 1-6, 5th International Conference on Malicious and Unwanted Software, Malware 2010, Nancy, France, 19/10/10. https://doi.org/10.1109/MALWARE.2010.5665801
Vasiliadis G, Polychronakis M, Ioannidis S. GPU-assisted malware. In Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010. 2010. p. 1-6. 5665801 https://doi.org/10.1109/MALWARE.2010.5665801
Vasiliadis, Giorgos ; Polychronakis, Michalis ; Ioannidis, Sotiris. / GPU-assisted malware. Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010. 2010. pp. 1-6
@inproceedings{db78cbecf3fb4962b08a8baac89ef1dd,
title = "GPU-assisted malware",
abstract = "Malware writers constantly seek new methods to obfuscate their code so as to evade detection by virus scanners. Two code-armoring techniques that pose significant challenges to existing malicious-code detection and analysis systems are unpacking and run-time polymorphism. In this paper, we demonstrate how malware can increase its robustness against detection by taking advantage of the ubiquitous Graphics Processing Unit. We have designed and implemented unpacking and run-time polymorphism for a GPU, and tested them using existing graphics hardware. We also discuss how upcoming GPU features can be utilized to build even more robust, evasive, and functional malware.",
author = "Giorgos Vasiliadis and Michalis Polychronakis and Sotiris Ioannidis",
year = "2010",
doi = "10.1109/MALWARE.2010.5665801",
language = "English",
isbn = "9781424493555",
pages = "1--6",
booktitle = "Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010",

}

TY - GEN

T1 - GPU-assisted malware

AU - Vasiliadis, Giorgos

AU - Polychronakis, Michalis

AU - Ioannidis, Sotiris

PY - 2010

Y1 - 2010

N2 - Malware writers constantly seek new methods to obfuscate their code so as to evade detection by virus scanners. Two code-armoring techniques that pose significant challenges to existing malicious-code detection and analysis systems are unpacking and run-time polymorphism. In this paper, we demonstrate how malware can increase its robustness against detection by taking advantage of the ubiquitous Graphics Processing Unit. We have designed and implemented unpacking and run-time polymorphism for a GPU, and tested them using existing graphics hardware. We also discuss how upcoming GPU features can be utilized to build even more robust, evasive, and functional malware.

AB - Malware writers constantly seek new methods to obfuscate their code so as to evade detection by virus scanners. Two code-armoring techniques that pose significant challenges to existing malicious-code detection and analysis systems are unpacking and run-time polymorphism. In this paper, we demonstrate how malware can increase its robustness against detection by taking advantage of the ubiquitous Graphics Processing Unit. We have designed and implemented unpacking and run-time polymorphism for a GPU, and tested them using existing graphics hardware. We also discuss how upcoming GPU features can be utilized to build even more robust, evasive, and functional malware.

UR - http://www.scopus.com/inward/record.url?scp=78651410940&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78651410940&partnerID=8YFLogxK

U2 - 10.1109/MALWARE.2010.5665801

DO - 10.1109/MALWARE.2010.5665801

M3 - Conference contribution

AN - SCOPUS:78651410940

SN - 9781424493555

SP - 1

EP - 6

BT - Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010

ER -