2013
DOI: 10.1007/s11416-013-0185-4
|View full text |Cite
|
Sign up to set email alerts
|

Structural entropy and metamorphic malware

Abstract: Structural Entropy and Metamorphic Malware by Donabelle BaysaMetamorphic malware is capable of changing its internal structure without altering its functionality. A common signature is nonexistent in highly metamorphic malware. Consequently, such malware may remain undetected even under emulation and signature scanning combined.In this project, we use the concept of structural entropy to analyze variations in the complexity of data within a file. The process consists of two stages, namely, file segmentation an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
96
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 123 publications
(100 citation statements)
references
References 18 publications
(37 reference statements)
2
96
2
Order By: Relevance
“…Recent research [3] further developed the concept of using structural entropy calculations to identify file similarity. The structural entropy technique, originally introduced in [22], produced good results when applied to polymorphic malware.…”
Section: Structural Entropymentioning
confidence: 99%
See 4 more Smart Citations
“…Recent research [3] further developed the concept of using structural entropy calculations to identify file similarity. The structural entropy technique, originally introduced in [22], produced good results when applied to polymorphic malware.…”
Section: Structural Entropymentioning
confidence: 99%
“…The structural entropy technique, originally introduced in [22], produced good results when applied to polymorphic malware. As a logical next step, the technique was adapted by [3] to apply it to metamorphic malware. As opposed to several previous detection techniques, structural entropy analysis examines the raw bytes of files rather than analyzing the disassembled opcode sequences.…”
Section: Structural Entropymentioning
confidence: 99%
See 3 more Smart Citations