2006
DOI: 10.1007/11663812_11
|View full text |Cite
|
Sign up to set email alerts
|

Polymorphic Worm Detection Using Structural Information of Executables

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
268
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 248 publications
(270 citation statements)
references
References 8 publications
2
268
0
Order By: Relevance
“…Initial approaches focused on the identification of the sled component that often precedes the shellcode [2,29]. Recent works aim to detect the polymorphic shellcode itself using various approaches, such as the identification of structural similarities among different worm instances [15], control and data flow analysis [8,32], or neural networks [21].…”
Section: Related Workmentioning
confidence: 99%
“…Initial approaches focused on the identification of the sled component that often precedes the shellcode [2,29]. Recent works aim to detect the polymorphic shellcode itself using various approaches, such as the identification of structural similarities among different worm instances [15], control and data flow analysis [8,32], or neural networks [21].…”
Section: Related Workmentioning
confidence: 99%
“…These were identifiable at the time when its static code model was checked against its execution. Kruegel et al [33] suggested the usage of comparison of binary code and structural analysis. It was based on the control flow.…”
Section: Existing Workmentioning
confidence: 99%
“…Authors in [38] detected variants of a malware using semantic approach which is based on the system call made by the malwares while execution. Authors used Hidden Markov Models (HMMs) to determine the statistical properties of malware variants in [39]. Lee et al [40] discovered that using some obfuscation techniques, the detection of malwares using HMM can be overcome.…”
Section: Existing Workmentioning
confidence: 99%
“…The majority of the binary code in such polymorphic malware exists as an encrypted or packed payload, which is unencrypted or unpacked at runtime and executed. Signature-based protection systems typically detect polymorphic malware by identifying distinguishing features in the small unencrypted code stub that decrypts the payload (e.g., [9]). More recently, metamorphic malware has appeared, which randomly applies binary transformations to its code segment during propagation in order to obfuscate features in the unencrypted portion.…”
Section: Related Workmentioning
confidence: 99%
“…An example is the MetaPHOR system (c.f., [10]), which has become the basis for many other metamorphic malware propagation systems. Reversing these obfuscations to obtain reliable feature sets for signature-based detection is the subject of much current research [9,11,12], but case studies have shown that current antivirus detection schemes remain vulnerable to simple obfuscation attacks until the detector's signature database is updated to respond to the threat [13].…”
Section: Related Workmentioning
confidence: 99%