2014 5th European Workshop on Visual Information Processing (EUVIP) 2014
DOI: 10.1109/euvip.2014.7018361
|View full text |Cite
|
Sign up to set email alerts
|

Detecting packed executables using steganalysis

Abstract: This paper proposes a novel method of detecting packed executable files using steganalysis, primarily targeting the detection of obfuscated malware through packing. Considering that over 80% of malware in the wild is packed, detection accuracy and low false negative rates are important properties of malware detection methods. Experimental results outlined in this paper reveal that the proposed approach achieving an overall detection accuracy of greater than 99%, a false negative rate of 1% and a false positive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
(13 reference statements)
0
3
0
Order By: Relevance
“…Steganalysis, the study of detecting hidden communication inside digital data, was proposed as a means of packer detection by Brugess et al in [13]. Their method converts the executable to a gray-scale image, from which features are then extracted to train a support vector machine.…”
Section: Related Workmentioning
confidence: 99%
“…Steganalysis, the study of detecting hidden communication inside digital data, was proposed as a means of packer detection by Brugess et al in [13]. Their method converts the executable to a gray-scale image, from which features are then extracted to train a support vector machine.…”
Section: Related Workmentioning
confidence: 99%
“…Computer vision techniques and SVMs were used in [18] for malware detection achieving an accuracy of 95% on a dataset with 37K samples. A combination of ML, visualization and steganalysis was proposed in [1] to detect packed malware; both SVMs and a variation of the k-nearest neighbour (KNN) were used, with the later achieving a classification accuracy of 99.5%. A similarity detection framework with 1.2M samples was used in [19] for malware classification; an accuracy of 99% was achieved (for about half of the samples), but the use of similarity considerably lowers the probability of detecting unknown malware with dissimilar structure.…”
Section: Related Workmentioning
confidence: 99%
“…The steganalysts are usually something of forensic statisticians, and must start by reducing the suspect set of data files to the subset most likely to have been altered [2]. In addition to the forensics and homeland security use [3], the steganalysis strategies are also beneficial in civilian applications by detecting all kinds of malware meant to harm the computers [4].…”
Section: Introductionmentioning
confidence: 99%