2022
DOI: 10.1016/j.cose.2021.102550
|View full text |Cite
|
Sign up to set email alerts
|

A Systematical and longitudinal study of evasive behaviors in windows malware

Abstract: Malware is one of the prevalent security threats. Sandboxes and, more generally, instrumented environments play a crucial role in dynamically analyzing malware samples, providing key threat intelligence results and critical information to update detection mechanisms.In this paper, we study the evasive behaviors employed by malware authors to hide the malicious activity of samples and hinder security analysis. First, we collect and systematize 92 evasive techniques leveraged by Windows malware to detect and thw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
32
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(46 citation statements)
references
References 23 publications
1
32
1
Order By: Relevance
“…Anti-debugging and anti-virtualization techniques used in early malware [10] employ numerous evasion methods to hide or reduce malicious activities. These anti-detection methods are analyzed comprehensively in the recent study by Galloro et al [32] where over 92 classes of evasive techniques executed by modern malware.…”
Section: Related Workmentioning
confidence: 99%
“…Anti-debugging and anti-virtualization techniques used in early malware [10] employ numerous evasion methods to hide or reduce malicious activities. These anti-detection methods are analyzed comprehensively in the recent study by Galloro et al [32] where over 92 classes of evasive techniques executed by modern malware.…”
Section: Related Workmentioning
confidence: 99%
“…If malware detects that it is being analyzed, it can cease execution, execute misleading behavior and hide its malicious intent. This delays classi cation of new malware, allowing it more time to in ict damage or extort more ransoms 18,19 . Evasive malware is widespread and uses varied obfuscation and anti-analysis techniques to defeat widely used static and dynamic analysis tools 10,[19][20][21] .…”
Section: Introductionmentioning
confidence: 99%
“…This delays classi cation of new malware, allowing it more time to in ict damage or extort more ransoms 18,19 . Evasive malware is widespread and uses varied obfuscation and anti-analysis techniques to defeat widely used static and dynamic analysis tools 10,[19][20][21] . Obfuscation is a technique used by malware authors to conceal the true intent and functionality of malicious code and involves modifying the malware using packing, encoding, metamorphism and polymorphism, which are all widely used and severely limit static analysis 3,11,22,23 .…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations