2008
DOI: 10.1007/s11416-008-0084-2
|View full text |Cite
|
Sign up to set email alerts
|

Code obfuscation techniques for metamorphic viruses

Abstract: This paper deals with metamorphic viruses. More precisely, it examines the use of advanced code obfuscation techniques with respect to metamorphic viruses. Our objective is to evaluate the difficulty of a reliable static detection of viruses that use such obfuscation techniques. Here we extend Spinellis' result (IEEE Trans. Inform. Theory, 49(1), [280][281][282][283][284] 2003) on the detection complexity of bounded-length polymorphic viruses to metamorphic viruses. In particular, we prove that reliable stati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
110
0
4

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 149 publications
(116 citation statements)
references
References 16 publications
0
110
0
4
Order By: Relevance
“…Our approach could easily be combined with current signature-evading techniques such as metamorphic viruses [34]. By doing so, AutoShadow could be able to evade both signaturebased and behavior-based malware detector.…”
Section: Discussionmentioning
confidence: 99%
“…Our approach could easily be combined with current signature-evading techniques such as metamorphic viruses [34]. By doing so, AutoShadow could be able to evade both signaturebased and behavior-based malware detector.…”
Section: Discussionmentioning
confidence: 99%
“…By obfuscating repeatedly, two copies from the same malware will be quite different and most of current detection methods fail to completely identify such every-increasingly stealth metamorphic malware. The obfuscation techniques can be divided in two types, data flow obfuscation (junk or dead code insertion, variable or register substitution, instruction replacement or permutation) and control flow obfuscation [8].…”
Section: Metamorphismmentioning
confidence: 99%
“…The reason for this change is quite simple: Traditional detection signatures, built upon fragments of executable code extracted from malicious samples, characterise a specific malware type on a syntactic level. However, syntactic features are relatively easy to obscure or modify, as also pointed out by Moser et al [1], mainly by techniques of encryption, packing [2], [3], [4], polymorphism, metamorphism, and code obfuscation, implemented on control-flow or data-flow of a program [5].…”
Section: Introductionmentioning
confidence: 99%