Metamorphic Malware and Obfuscation: A Survey of Techniques, Variants, and Generation Kits

被引:0
|
作者
Brezinski, Kenneth [1 ]
Ferens, Ken [1 ]
机构
[1] Department of Electrical and Computer Engineering, University of Manitoba Winnipeg, Winnipeg, Canada
关键词
Cryptography - Network security - Reverse engineering;
D O I
10.1155/2023/8227751
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The competing landscape between malware authors and security analysts is an ever-changing battlefield over who can innovate over the other. While security analysts are constantly updating their signatures of known malware, malware variants are changing their signature each time they infect a new host, leading to an endless game of cat and mouse. This survey looks at providing a thorough review of obfuscation and metamorphic techniques commonly used by malware authors. The main topics covered in this work are (1) to provide an overview of string-scanning techniques used by antivirus vendors and to explore the impact malware has had from a security and monetary perspective; (2) to provide an overview of the methods of obfuscation during disassembly, as well as methods of concealment using a combination of encryption and compression; (3) to provide a comprehensive list of the datasets we have available to us in malware research, including tools to obfuscate malware samples, and to finally (4) discuss the various ways Windows APIs are categorized and vectorized to identify malicious binaries, especially in the context of identifying obfuscated malware variants. This survey provides security practitioners a better understanding of the nature and makeup of the obfuscation employed by malware. It also provides a review of what are the main barriers to reverse-engineering malware for the purposes of uncovering their complexity and purpose. © 2023 Kenneth Brezinski and Ken Ferens.
引用
收藏
相关论文
共 50 条
  • [1] Code obfuscation techniques for metamorphic viruses
    Borello, Jean-Marie
    Me, Ludovic
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (03): : 211 - 220
  • [2] Obfuscation Code Localization Based on CFG Generation of Malware
    Nguyen Minh Hai
    Ogawa, Mizuhito
    Quan Thanh Tho
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 229 - 247
  • [3] AOMDroid: Detecting Obfuscation Variants of Android Malware Using Transfer Learning
    Jiang, Yu
    Li, Ruixuan
    Tang, Junwei
    Davanian, Ali
    Yin, Heng
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 242 - 253
  • [4] A survey on Java program obfuscation techniques
    School of Software, Tsinghua University, Beijing 100084, China
    不详
    不详
    不详
    [J]. Jisuanji Xuebao, 9 (1578-1588):
  • [5] Evaluation of Android Anti Malware Techniques against Dalvik Bytecode Obfuscation
    Faruki, Parvez
    Bharmal, Ammar
    Laxmi, Vijay
    Gaur, M. S.
    Conti, Mauro
    Rajarajan, Muttukrishnan
    [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 414 - 421
  • [6] An overview of obfuscation techniques used by malware in Visual Basic for Application scripts
    Lupascu, Marilena
    Gavrilut, Dragos Teodor
    Lucanu, Dorel
    [J]. 2018 20TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2018), 2019, : 280 - 287
  • [7] On the evaluation of android malware detectors against code-obfuscation techniques
    Nawaz, Umair
    Aleem, Muhammad
    Lin, Jerry Chun-Wei
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8
  • [8] DRLDO: A Novel DRL based De-obfuscation System for Defence Against Metamorphic Malware
    Sewak, Mohit
    Sahay, Sanjay K.
    Rathore, Hemant
    [J]. DEFENCE SCIENCE JOURNAL, 2021, 71 (01) : 55 - 65
  • [9] A Survey on Android Malware Detection Techniques
    Riasat, Rubata
    Sakeena, Muntaha
    Wang, Chong
    Sadiq, Abdul Hannan
    Wang, Yong-ji
    [J]. INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND NETWORK ENGINEERING (WCNE 2016), 2016,
  • [10] A Survey on Heuristic Malware Detection Techniques
    Bazrafshan, Zahra
    Hashemi, Hashem
    Fard, Seyed Mehdi Hazrati
    Hamzeh, Ali
    [J]. 2013 5TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2013, : 113 - 120