Obfuscated Malicious Executable Scanner
نویسندگان
چکیده
The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presented a serious threat to individual users, enterprises, and organizations alike. Current static scanning techniques for malware detection have serious limitations; on the other hand, sandbox testing fails to provide a complete satisfactory solution either due to time constraints (e.g., time bombs cannot be detected before its preset time expires). What is making the situation worse is the ease of producing polymorphic (or variants of) computer viruses that are even more complex and difficult than their original versions to detect. In this paper, we propose a new approach for detecting polymorphic malware in the Windows platform. Our approach rests on an analysis based on the Windows API calling sequence that reflects the behaviour of a particular piece of code. The analysis is carried out directly on the PE (portable executable) code. It is achieved in two basic steps: construct the API calling sequences for both the known virus and the suspicious code, and then perform a similarity measurement between the two sequences after a sequence realignment operation is done. An alternative technique based on comparing the bags of API calls, and the technique’s performance, are also studied. Favourable (in terms of time and accuracy of detection) experimental results are obtained and presented.
منابع مشابه
Stack Shape Analysis to Detect Obfuscated calls in Binaries
Information about calls to the operating system (or kernel libraries) made by a binary executable maybe used to determine whether the binary is malicious. Being aware of this approach, malicious programmers hide this information by making such calls without using the CALL instruction. For instance, the CALL ADDR instruction may be replaced by two PUSH instructions and a RETURN instruction, the ...
متن کاملAbstract Stack Graph to Detect Obfuscated Calls in Binaries
Information about calls to the operating system (or kernel libraries) made by a binary executable may be used to determine whether the binary is malicious. Being aware of this approach, malicious programmers hide this information by making such calls without using the call instruction. For instance, the ‘call addr’ instruction may be replaced by two push instructions and a return instruction, t...
متن کاملAnalyzing Memory Accesses in Obfuscated x86 Executables
Programmers obfuscate their code to defeat manual or automated analysis. Obfuscations are often used to hide malicious behavior. In particular, malicious programs employ obfuscations of stack-based instructions, such as call and return instructions, to prevent an analyzer from determining which system functions it calls. Instead of using these instructions directly, a combination of other instr...
متن کاملA Survey on Techniques in Detection and Analyzing Malware Executables
The computer technology has emerged as a necessity in our day to day life to deal with various aspects like education, banking, communication, entertainment etc. Computer system’s security is threatened by weapons named as malware to accomplish malicious intention of its writers. Various solutions are available to detect these threats like AV Scanners, Intrusion Detection System, and Firewalls ...
متن کاملArchitecture of Malware Detector for Obfuscated Code Inspection
Signature-based malware detection is a very fundamental technique that detects malware by generating signatures. The detection however, is unable to detect obfuscated malware unless pre-generated signature is stored in the database. In this paper, we propose a combination of known packer detection, unpacking module, and heuristic scanning techniques to find and block a malicious program before ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Research and Practice in Information Technology
دوره 39 شماره
صفحات -
تاریخ انتشار 2007