2008
DOI: 10.1109/msp.2008.126
|View full text |Cite
|
Sign up to set email alerts
|

Revealing Packed Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0
3

Year Published

2010
2010
2023
2023

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 90 publications
(38 citation statements)
references
References 0 publications
0
35
0
3
Order By: Relevance
“…Anti-virus software may be of very little benefit to assist the forensic investigator in the identification of the intent of malware. The detection performance of AV software has been shown by a number of researchers to be far less than ideal (Rutkowska 2006;Yin, Song et al 2007;Yan, Zhang et al 2008;Zhou and Meador Inge 2008). If the malware has not been analysed before, then it is highly unlikely that rules of recognition exist.…”
Section: Analysis Avoidancementioning
confidence: 99%
“…Anti-virus software may be of very little benefit to assist the forensic investigator in the identification of the intent of malware. The detection performance of AV software has been shown by a number of researchers to be far less than ideal (Rutkowska 2006;Yin, Song et al 2007;Yan, Zhang et al 2008;Zhou and Meador Inge 2008). If the malware has not been analysed before, then it is highly unlikely that rules of recognition exist.…”
Section: Analysis Avoidancementioning
confidence: 99%
“…Unfortunately, connived (indulged) on their previous success attackers develop their malware so that harder to detect [1,2]. Following Yan et al's [3] understanding, we consider packer as "a program that produces a number of data blocks to form a compressed and encrypted version of the original executable". Packing helps to evade from anti-virus (AV) by diminishing the size or transforming the appearance of executable binary [2,[4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…To prevent themselves from being analyzed and reverse engineered, more and more malwares (e.g., Agobot, MegaD, Kraken, Conficker) are using cryptographic algorithms (e.g., packing [51], encrypting C&C communication) to protect the malicious code and communication [40]. To prevent the in-memory cryptographic secrets (e.g., key, IV) from being recovered by key searching tools (e.g., rsakeyfind), sophisticated malware can make the cryptographic secrets truly transient in memory by encrypting or destroying the secrets right after using them at run-time.…”
Section: Introductionmentioning
confidence: 99%