2019
DOI: 10.1155/2019/5278137
|View full text |Cite
|
Sign up to set email alerts
|

All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis

Abstract: Packing is the most common analysis avoidance technique for hiding malware. Also, packing can make it harder for the security researcher to identify the behaviour of malware and increase the analysis time. In order to analyze the packed malware, we need to perform unpacking first to release the packing. In this paper, we focus on unpacking and its related technologies to analyze the packed malware. Through extensive analysis on previous unpacking studies, we pay attention to four important drawbacks: no phase … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 24 publications
0
3
0
1
Order By: Relevance
“…The 'ep_only' attribute indicates whether a signature can be found in the entry point section as True or False. The ground truths were labeled based on a portion of the framework proposed in a previous study, referred to as Algorithm 6 [33]. Among the collected samples, 87,499 were labeled as Custom-Packed when a sample had hidden EPS (entry point sections) or high entropy values without a packer signature.…”
Section: Permutation Importancementioning
confidence: 99%
“…The 'ep_only' attribute indicates whether a signature can be found in the entry point section as True or False. The ground truths were labeled based on a portion of the framework proposed in a previous study, referred to as Algorithm 6 [33]. Among the collected samples, 87,499 were labeled as Custom-Packed when a sample had hidden EPS (entry point sections) or high entropy values without a packer signature.…”
Section: Permutation Importancementioning
confidence: 99%
“…This study conducted a comprehensive review of the approaches for detecting malware only based on sample operation codes (OpCodes) and drew useful insights towards them. As mentioned earlier, this study focused on the malware OpCodes features and dropped the other malware features like API system calls features such in [5][38][39][40] [70] and text features such as in [38][39][40] [71][72] due to their limitations, since the former could be decoyed when the evader uses his own developed OpCodes instructions written from the ground up instead of uses of the formal API system calls. As well, it dropped the latter because the garbag of text that could be injected into the malware, which evades detection, too.…”
Section: Recommendations and Future Directionsmentioning
confidence: 99%
“…Penggunaan teknik enkripsi, mutasi dan pengemasan (packer) untuk melundungi malware dari sistem analis, menjadikan malware mampu menghindari dateksi (Zhang et al, 2020). Variasi dan kemampuan malware meningkat setiap tahun, salah satunya adalah packer yang merupakan sebuah teknik penyamaran yang digunakan untuk menghindari deteksi dan analisis malware (Choi et al, 2019). Pada dasarnya analisis terhadap malware diperlukan untuk mengetahui ciri, pola serangan, pola perlindungan terhadap malware agar tidak mudah dideteksi dan mengantisipasi infeksi malware pada sebuah sistem.…”
Section: Pendahuluanunclassified