11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Malicious Code Analysis<br />

The Challenge: Malicious Code<br />

Malicious code, 33 or malware, has affected <strong>the</strong> DoD, including <strong>the</strong> Pentagon and federal agencies,<br />

for well over a decade [Brewin 1999, Verton 1999, Ruppe 2001]. Retail businesses, banks, and a<br />

stock exchange have all been victims. Attackers have developed hundreds <strong>of</strong> thousands <strong>of</strong> pieces<br />

<strong>of</strong> malicious code; some well-publicized early ones were known as Melissa, LoveLetter, Nimda,<br />

and Code Red. Viruses have affected an estimated two-thirds <strong>of</strong> Fortune 500 companies and cost<br />

victims billions <strong>of</strong> dollars in productivity [Frontline 2000].<br />

Malicious code exploits s<strong>of</strong>tware vulnerabilities. However, in <strong>the</strong> 1990s, <strong>the</strong> community had not<br />

matured to <strong>the</strong> point <strong>of</strong> sharing tools and techniques, and doing cross mentoring. Only a few people<br />

had strong skills in reverse engineering malicious code to understand how it works; and ra<strong>the</strong>r<br />

than work toge<strong>the</strong>r, <strong>the</strong>y seemed to compete.<br />

A Solution: Malicious Code Database and Analysis<br />

In <strong>the</strong> late 1990s, <strong>the</strong> CERT/CC at <strong>the</strong> <strong>SEI</strong> began studying <strong>the</strong> malicious s<strong>of</strong>tware that got into systems<br />

through vulnerabilities and social engineering—tricking people into actions that allowed malware<br />

onto <strong>the</strong>ir computers. The CERT/CC security experts had already become skilled at analyzing<br />

s<strong>of</strong>tware vulnerabilities. The malicious code work was prompted by CERT/CC incident responders’<br />

seeing <strong>the</strong> role malware played in computer security incidents. By 2000, malicious code was exploding,<br />

and <strong>the</strong> staff began more thorough analysis efforts [Bair 1999]. In dissecting malware, <strong>the</strong>y<br />

compiled a wealth <strong>of</strong> information not only about malicious code but also about how technology<br />

fails, what assets adversaries target, how <strong>the</strong>y acquire targets, and who <strong>the</strong> adversary is.<br />

The CERT/CC began building a database, which became known as <strong>the</strong> Artifact Catalog, 34 a repository<br />

<strong>of</strong> malicious code and related analysis that informs triage decisions and provides a basis for<br />

cross-threat analysis. The malware analysts also worked to establish relationships within <strong>the</strong> security<br />

community: for example, by raising awareness at pr<strong>of</strong>essional conferences and by working<br />

with experts through email. This visibility led to government interest and funding for <strong>the</strong> <strong>SEI</strong> malicious<br />

code work. Congress had become interested in solving <strong>the</strong> problem <strong>of</strong> malicious code and<br />

heard testimony on <strong>the</strong> subject. One <strong>of</strong> those testifying was tasked with “doing something” regarding<br />

malware, and <strong>the</strong> CERT Artifact Catalog proved to be <strong>the</strong> answer to that charge. Funding<br />

subsequently followed, allowing <strong>the</strong> work to grow.<br />

The CERT/CC created a separate, focused malicious code team, which had <strong>the</strong>se primary goals:<br />

(1) improve approaches to reverse engineering, (2) bring those doing reverse engineering toge<strong>the</strong>r<br />

into a community that would work collaboratively and learn from each o<strong>the</strong>r, and (3) reduce duplicate<br />

work in <strong>the</strong> community to make effective and efficient use <strong>of</strong> limited resources, as well as<br />

33 Malicious code is a form <strong>of</strong> cyber “tradecraft” used by adversaries to subvert <strong>the</strong> security posture<br />

and compromise <strong>the</strong> assets <strong>of</strong> organizations.<br />

34 The original intent <strong>of</strong> <strong>the</strong> catalog was to collect things left behind on an attacked machine, which<br />

<strong>the</strong> staff referred to as artifacts. These artifacts included malicious code but also logs and o<strong>the</strong>r<br />

files or items left behind by an intruder.<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 173<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!