Search papers, labs, and topics across Lattice.
This paper introduces a novel record-and-replay mechanism leveraging the Shapiro-Wilk normality test to detect the avalanche effect in binary-only ransomware, a key indicator of encryption loops. The approach addresses the challenges of inaccurate I/O identification and adversarial evasion in obfuscated code by statistically validating the avalanche effect itself, rather than just ripple effects. Experiments demonstrate a 0.0% false negative rate and a 1.1% false positive rate, successfully analyzing ransomware samples from ten representative families.
Existing ransomware detection methods only check for "ripple effects" of encryption, but this new approach statistically guarantees detection of the avalanche effect itself, even in the face of obfuscation.
Spotting encryption loops in binary-only ransomware is a critical reverse engineering task. Since the existence of avalanche effect, an intrinsic characteristic of any secure encryption algorithms, is unavoidable during a victim data encryption attack, it is a very promising direction to spot encryption loops through avalanche effect detection. Unfortunately, no existing work in this direction ensures that the being-checked effect is the avalanche effect itself. Although CipherXRay is inspired by avalanche effect, it only checks whether a"ripple effect"(i.e., a necessary but non-sufficient condition) of avalanche effect exists, allowing a straightforward counterattack to succeed. In this work, we present a new approach that checks the avalanche effect itself. Because the detection is conducted in adversarial settings (e.g., the ransomware author may obfuscate the code), a viable approach must tolerate inaccurate input \&output identification and must be resilient to adversarial evasion. These challenges are addressed by a novel record-and-replay detection mechanism that takes advantage of the statistical guarantees provided by the Shapiro-Wilk normality test. The experimental results show that our approach achieves 0.0\% false negative rate and 1.1\% false positive rate. When our tool is employed to reverse engineer real-world ransomware samples, it succeeds in analyzing all the ransomware samples selected from ten representative families.