Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.2.397

A Method to Collect Trusted Processes for Application Whitelisting in macOS  

Youn, Jung-moo (Chung-Nam National University)
Ryu, Jae-cheol (Chung-Nam National University)
Abstract
Blacklist-based tools are most commonly used to effectively detect suspected malicious processes. The blacklist-based tool compares the malicious code extracted from the existing malicious code with the malicious code. Therefore, it is most effective to detect known malicious codes, but there is a limit to detecting malicious code variants. In order to solve this problem, the necessity of a white list-based tool, which is the opposite of black list, has emerged. Whitelist-based tools do not extract features of malicious code processes, but rather collect reliable processes and verify that the process that checks them is a trusted process. In other words, if malicious code is created using a new vulnerability or if variant malicious code appears, it is not in the list of trusted processes, so it can effectively detect malicious code. In this paper, we propose a method for effectively building a whitelist through research that collects reliable processes in the macOS operating system.
Keywords
Whitelist; Detection; Ransomware;
Citations & Related Records
연도 인용수 순위
  • Reference
1 "Ransomware on the Rise, Exposing Vulnerability of EHRs", Biomedical safety & standards, Vol. 46 No. 10, pp.73-75, May. 2016
2 Ji-yo Park, "A Study on Malicious Behavior Detection of Ransomware in WIndows", A master's thesis, Konkuk University, Aug. 2016
3 "Objective-See", https://objective-see.com/blog/blog_0x0F.html
4 "macOS", https://ko.wikipedia.org/wiki/MacOS
5 "Code Signing Tasks", https://developer.apple.com/library/content/documentation /Security/Conceptual/CodeSigningGuide/Procedures/Procedures.html
6 "System Integrity Protection", https://en.wikipedia.org/wiki/System_Integrity_Protection
7 Jonathan Levin, MacOS and iOS Internals, Volume 3: Security & Insecurity, Paperback, 2016
8 Trend MICRO, "Ransomware as a Service", https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-as-a-service-ransomware-operators-find-ways-to-bring-in-business, Sep. 2016