11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

understand <strong>the</strong> relationship among <strong>the</strong> various groups in <strong>the</strong> community. They defined <strong>the</strong> following<br />

plan <strong>of</strong> work and are implementing it successfully.<br />

1. Bring reverse engineers toge<strong>the</strong>r in workshops, training, and mentoring sessions to allow<br />

<strong>the</strong>m to learn from each o<strong>the</strong>r and to increase <strong>the</strong> skills and capabilities <strong>of</strong> reverse engineers<br />

with less experience. The team held its first invitational Malicious Code Workshop in October<br />

2004 to discuss <strong>the</strong> top challenges in malware. By 2012, <strong>the</strong>y had held seven Malicious Code<br />

Workshops and seven Malicious Code Training Workshops, <strong>the</strong> latter focusing on sharing<br />

analysis techniques.<br />

2. Build a set <strong>of</strong> tools and processes to collect malicious code and make that collection available<br />

to collaborators so that <strong>the</strong> number <strong>of</strong> collection infrastructures can be minimized, particularly<br />

within <strong>the</strong> U.S. government. A catalog <strong>of</strong> malicious code and analysis processes was developed<br />

and is available to malware analysts and researchers. Development and analysis continue.<br />

The limited-access Artifact Catalog contained more than 80 million files in January<br />

2013, with typically a million new samples ingested weekly.<br />

3. Automate as many analysis functions as possible so limited resources can be spent on only<br />

<strong>the</strong> novel and <strong>the</strong> most important malware samples. Reverse engineering is a time-consuming<br />

technique—an analyst dissects every instruction in <strong>the</strong> malware. The <strong>SEI</strong> malware experts<br />

have codified some <strong>of</strong> <strong>the</strong>ir reverse engineering expertise into automated tools, which <strong>the</strong>y<br />

share with o<strong>the</strong>r analysts in <strong>the</strong> DoD and intelligence community. The <strong>SEI</strong> analysts use <strong>the</strong><br />

tools <strong>the</strong>mselves for research and to fulfill requests from government agencies. The team refines<br />

<strong>the</strong> tools and develops additional ones in <strong>the</strong> process [Householder 2011; Cohen 2009,<br />

2010].<br />

The Consequence: Faster Response to Malicious Code Attacks, Better<br />

Control<br />

Malware analysts at government operation centers have advanced tools, shortening <strong>the</strong>ir response<br />

times; <strong>the</strong>y also have specialized analytical support from <strong>the</strong> <strong>SEI</strong> through <strong>the</strong> CERT/CC artifact<br />

analysis team. The Artifact Catalog provides <strong>the</strong>m with an extensive collection <strong>of</strong> malicious code<br />

that supports trending and related research. The automated tools significantly decrease analysis<br />

time and enable analysts and researchers to be increasingly effective at identifying and understanding<br />

malicious code—understanding that is essential to gaining control over attacks and limiting<br />

<strong>the</strong> damage <strong>the</strong>y cause. The result is increased safety for U.S. government and agency systems.<br />

By providing analysis and serving as expert witnesses [Poulsen 2008, Ove 2010, Cruz 2011], <strong>SEI</strong><br />

malicious code experts have helped to shut down and apprehend a major identity <strong>the</strong>ft and fraud<br />

ring, whose activities caused more than $4 million in losses, and helped convict a perpetrator <strong>of</strong><br />

wire fraud that cost financial institutions an estimated $86 million [Mills 2009].<br />

The <strong>SEI</strong> Contribution<br />

The <strong>SEI</strong> Malicious Code team has collaborative relationships with both <strong>the</strong> DoD and <strong>the</strong> intelligence<br />

community. Because <strong>of</strong> <strong>the</strong> CERT/CC malware work, <strong>SEI</strong> collaborators and sponsors have<br />

<strong>the</strong> tools and education needed to streamline analysis and more quickly answer specific questions.<br />

The <strong>SEI</strong> has been a resource to build new capabilities in <strong>the</strong> U.S. government. Its malware experts<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 174<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!