pokiSEC: A Multi-Architecture, Containerized Ephemeral Malware Detonation Sandbox
By: Alejandro Avina, Yashas Hariprasad, Naveen Kumar Chaudhary
Potential Business Impact:
Tests computer viruses safely on any computer.
Dynamic malware analysis requires executing untrusted binaries inside strongly isolated, rapidly resettable environments. In practice, many detonation workflows remain tied to heavyweight hypervisors or dedicated bare-metal labs, limiting portability and automation. This challenge has intensified with the adoption of ARM64 developer hardware (e.g., Apple Silicon), where common open-source sandbox recipes and pre-built environments frequently assume x86_64 hosts and do not translate cleanly across architectures. This paper presents pokiSEC, a lightweight, ephemeral malware detonation sandbox that packages the full virtualization and access stack inside a Docker container. pokiSEC integrates QEMU with hardware acceleration (KVM when available) and exposes a browser-based workflow that supports bring-your-own Windows disk images. The key contribution is a Universal Entrypoint that performs runtime host-architecture detection and selects validated hypervisor configurations (machine types, acceleration modes, and device profiles), enabling a single container image and codebase to launch Windows guests on both ARM64 and x86_64 hosts. We validate pokiSEC on Apple Silicon (ARM64) and Ubuntu (AMD64), demonstrating interactive performance suitable for analyst workflows and consistent teardown semantics via ephemeral container lifecycles.
Similar Papers
SaMOSA: Sandbox for Malware Orchestration and Side-Channel Analysis
Cryptography and Security
Finds computer viruses in machines that control things.
Plug. Play. Persist. Inside a Ready-to-Go Havoc C2 Infrastructure
Cryptography and Security
Finds hackers hiding in cloud computers.
SmartPoC: Generating Executable and Validated PoCs for Smart Contract Bug Reports
Software Engineering
Finds hidden bugs in computer money code.