2015
DOI: 10.5120/21738-4937
|View full text |Cite
|
Sign up to set email alerts
|

Detecting and Classifying Morphed Malwares: A Survey

Abstract: In this era, most of the antivirus companies are facing immense difficulty in detecting morphed malwares as they conceal themselves from detection. Malwares use various techniques to camouflage themselves so as to increase their lifetime. These obscure methods cannot completely impede analysis, but it prolongs the process of analysis and detection. This paper presents a review on malware detection systems and the progress made in detecting advanced malwares which will serve as a reference to researchers intere… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…The malware developers use obfuscation techniques to conceal the malicious code in order to bypass the malware detection system. The camouflage in malware has an exponential growth over the years from simple encryption to complex polymorphic and metamorphic malware [23], [52]. These two malware are the main types of malicious code using obfuscation techniques to hide themselves from virus scanners.…”
Section: Specific Obfuscation Techniques: Malware Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…The malware developers use obfuscation techniques to conceal the malicious code in order to bypass the malware detection system. The camouflage in malware has an exponential growth over the years from simple encryption to complex polymorphic and metamorphic malware [23], [52]. These two malware are the main types of malicious code using obfuscation techniques to hide themselves from virus scanners.…”
Section: Specific Obfuscation Techniques: Malware Applicationmentioning
confidence: 99%
“…Below are the most common obfuscation techniques, among many others, that are particularly used to hide malware. More details and practical examples can be found in [11], [61], [48], [52], [51].…”
Section: Specific Obfuscation Techniques: Malware Applicationmentioning
confidence: 99%
“…Subsequently, these are executed automatically (using a python script) in a sandboxed environment set up at Cyber Security Research Centre (CSRC), PEC University of Technology, Chandigarh, India. We used Brad Accuvant 3 , a modified version of Cuckoo sandbox 4 for this purpose which offers numerous improvements over regular Cuckoo. It is an open source automated malware analysis system developed in python.…”
Section: Malware Analysis Enginementioning
confidence: 99%
“…Malware writers are making use of obfuscation techniques like insertion of dead code, subroutine reordering, instruction substitution etc. for creating polymorphic and metamorphic malware [4]. Moreover, the malware are becoming sophisticated, targeted, persistent, stealthy and unknown day by day.…”
mentioning
confidence: 99%
“…According to the report of McAfee, more than 31 million samples were discovered as Android malware and 1.9 million new samples are found every year [2]. However, most of the new malicious applications are installed as variants of earlier known ones [3], [4]. As a result, malicious programs can be grouped into their families having a set of similar characteristics and behaviors.…”
Section: Introductionmentioning
confidence: 99%