SaMOSA: Sandbox for Malware Orchestration and Side-Channel Analysis
SaMOSA: Sandbox for Malware Orchestration and Side-Channel Analysis
Cyber-attacks on operational technology (OT) and cyber-physical systems (CPS) have increased tremendously in recent years with the proliferation of malware targeting Linux-based embedded devices of OT and CPS systems. Comprehensive malware detection requires dynamic analysis of execution behavior in addition to static analysis of binaries. Safe execution of malware in a manner that captures relevant behaviors via side-channels requires a sandbox environment. Existing Linux sandboxes are built for specific tasks, only capture one or two side-channels, and do not offer customization for different analysis tasks. We present the SaMOSA Linux sandbox that allows emulation of Linux malwares while capturing time-synchronized side-channels from four sources. SaMOSA additionally provides emulation of network services via FakeNet, and allows orchestration and customization of the sandbox environment via pipeline hooks. In comparison to existing Linux sandboxes, SaMOSA captures more side-channels namely system calls, network activity, disk activity, and hardware performance counters. It supports three architectures predominantly used in OT and CPS namely x86-64, ARM64, and PowerPC 64. SaMOSA fills a gap in Linux malware analysis by providing a modular and customizable sandbox framework that can be adapted for many malware analysis tasks. We present three case studies of three different malware families to demonstrate the advantages of SaMOSA.
Meet Udeshi、Venkata Sai Charan Putrevu、Prashanth Krishnamurthy、Ramesh Karri、Farshad Khorrami
计算技术、计算机技术
Meet Udeshi,Venkata Sai Charan Putrevu,Prashanth Krishnamurthy,Ramesh Karri,Farshad Khorrami.SaMOSA: Sandbox for Malware Orchestration and Side-Channel Analysis[EB/OL].(2025-08-19)[2025-09-02].https://arxiv.org/abs/2508.14261.点此复制
评论