2020
DOI: 10.1016/j.csi.2020.103443
|View full text |Cite
|
Sign up to set email alerts
|

Metamorphic malware identification using engine-specific patterns based on co-opcode graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(32 citation statements)
references
References 29 publications
0
26
0
Order By: Relevance
“…The malware binary files were downloaded from the public repository Vxheaven (https://www.vxheaven.org). Vxheaven dataset is a public repository that is commonly-used by previous malware analysis studies such as in [14,36,37,[40][41][42]. The malware dataset contains different types of malware families such as trojans, adware, backdoors, ransomware, viruses, and worms among many others.…”
Section: B Dataset Descriptionmentioning
confidence: 99%
“…The malware binary files were downloaded from the public repository Vxheaven (https://www.vxheaven.org). Vxheaven dataset is a public repository that is commonly-used by previous malware analysis studies such as in [14,36,37,[40][41][42]. The malware dataset contains different types of malware families such as trojans, adware, backdoors, ransomware, viruses, and worms among many others.…”
Section: B Dataset Descriptionmentioning
confidence: 99%
“…A drastic change in the entropy of machine code created by standard compilers indicates that the file has been packed. Many types of packers such as UPX 2 , FSG, Yoda's 3 , ExeStealth 4 , PETite 5 , ASPack 6 , UPack, and VMProtect 7 can be detected by looking for a unique sequence of byte codes [8], though the unpacking patterns and decryption keys are not detectable using this method. The complexity and ambiguity of malware activities prompts analysts towards dynamically monitoring and analyzing malware's behavior in order to discover the true nature of obfuscated files.…”
Section: Mmentioning
confidence: 99%
“…All these malware programs are pursuing a single malicious goal -but from different channels. This is why obfuscation and metamorphic engines play a critical role in the development of a large number of perilous malware programs in today's IT environment [4]. Consequently, there is a never-ending battle between malware developers and security analyzers, which is evolving as rapidly as the complexity of malware advances [5].…”
Section: Introductionmentioning
confidence: 99%
“…Afterwards, it uses a set of rules or thresholds to detect the malicious codes. Recently, a study shows that the metamorphic malware can be identified using engine specific patterns developed from co‐opcode graph 29 . Each node of the graph represents a unique opcode that works as a discriminating feature.…”
Section: Malware Detection Techniquesmentioning
confidence: 99%