2022
DOI: 10.1145/3530810
|View full text |Cite
|
Sign up to set email alerts
|

File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements

Abstract: With the growing sophistication of malware, the need to devise improved malware detection schemes is crucial. The packing of executable files, which is one of the most common techniques for code protection, has been repurposed for code obfuscation by malware authors as a means of evading malware detectors (mainly static analysis-based detectors). This paper provides statistics on the use of packers based on an extensive analysis of 24,000 PE files (both malicious and benign files) for the past 10 years, which … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(7 citation statements)
references
References 61 publications
0
6
0
Order By: Relevance
“…Determining whether a binary has been packed is a critical preliminary step in the process of malware detection [3]. Research conducted by Osaghae indicates that over 80% of current malware samples utilize packing [11], highlighting the significance of addressing this issue through both detection and unpacking.…”
Section: Packed File Detection Using Machine Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…Determining whether a binary has been packed is a critical preliminary step in the process of malware detection [3]. Research conducted by Osaghae indicates that over 80% of current malware samples utilize packing [11], highlighting the significance of addressing this issue through both detection and unpacking.…”
Section: Packed File Detection Using Machine Learningmentioning
confidence: 99%
“…However, the challenge of anti-analysis extends beyond merely prolonging the malware's operational life. When researchers analyze packed malware samples, they often extract features introduced by the packer rather than the original program [3]. This discrepancy can lead to potential mismatches between analysis results and the actual malicious behavior, particularly as packed malware can detect and avoid dynamic analysis.…”
Section: Introductionmentioning
confidence: 99%
“…Code transformation techniques hinder disassembly tools [105] and evade commercial anti-malware [37,106,107]. These techniques obfuscate existing malware samples to generate unseen malicious files.…”
Section: Code Transformationmentioning
confidence: 99%
“…Although the section above analysed the state-of-the-art of network traffic generators, none of those has a security-oriented approach since there was no distinction between the inference of neutral (benign) and malicious traffic. The particular traffic generation requirements for this purpose, among others, are discussed in [14], where three types of workloads are distinguished: (1) workloads that do not contain attacks (Pure benign); (2) workloads that contain only attacks (pure malicious); (3) workloads that are a mixture of pure benign and pure malicious workloads (Mixed) [54]. These types of workloads may present two different forms: executable and trace.…”
Section: Content Generation For Cybersecurity Evaluationmentioning
confidence: 99%