Metamorphic Malware and Obfuscation: A Survey of Techniques, Variants, and Generation Kits

被引:0
|
作者
Brezinski, Kenneth [1 ]
Ferens, Ken [1 ]
机构
[1] Department of Electrical and Computer Engineering, University of Manitoba Winnipeg, Winnipeg, Canada
关键词
Cryptography - Network security - Reverse engineering;
D O I
10.1155/2023/8227751
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The competing landscape between malware authors and security analysts is an ever-changing battlefield over who can innovate over the other. While security analysts are constantly updating their signatures of known malware, malware variants are changing their signature each time they infect a new host, leading to an endless game of cat and mouse. This survey looks at providing a thorough review of obfuscation and metamorphic techniques commonly used by malware authors. The main topics covered in this work are (1) to provide an overview of string-scanning techniques used by antivirus vendors and to explore the impact malware has had from a security and monetary perspective; (2) to provide an overview of the methods of obfuscation during disassembly, as well as methods of concealment using a combination of encryption and compression; (3) to provide a comprehensive list of the datasets we have available to us in malware research, including tools to obfuscate malware samples, and to finally (4) discuss the various ways Windows APIs are categorized and vectorized to identify malicious binaries, especially in the context of identifying obfuscated malware variants. This survey provides security practitioners a better understanding of the nature and makeup of the obfuscation employed by malware. It also provides a review of what are the main barriers to reverse-engineering malware for the purposes of uncovering their complexity and purpose. © 2023 Kenneth Brezinski and Ken Ferens.
引用
收藏
相关论文
共 50 条
  • [31] Survey of Mobile Malware Analysis, Detection Techniques and Tool
    Gyamfi, Nana Kwame
    Owusu, Ebenezer
    [J]. 2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1101 - 1106
  • [32] Malware Detection Vectors and Analysis Techniques: A Brief Survey
    Deka, Dipjyoti
    Sarma, Nityananda
    Panicker, Nithin J.
    [J]. 2016 INTERNATIONAL CONFERENCE ON ACCESSIBILITY TO DIGITAL WORLD (ICADW), 2016, : 81 - 85
  • [33] A survey on artificial intelligence in malware as next–generation threats
    Thanh C.T.
    Zelinka I.
    [J]. Mendel, 2019, 25 (02) : 27 - 34
  • [34] Topological protection from the next generation malware: a survey
    Arbore, Andrea
    Fioriti, Vincenzo Antonio
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2013, 9 (1-2) : 52 - 73
  • [35] A Survey on Automated Dynamic Malware-Analysis Techniques and Tools
    Egele, Manuel
    Scholte, Theodoor
    Kirda, Engin
    Kruegel, Christopher
    [J]. ACM COMPUTING SURVEYS, 2012, 44 (02)
  • [36] A Comprehensive Survey on Machine Learning Techniques for Android Malware Detection
    Kouliaridis, Vasileios
    Kambourakis, Georgios
    [J]. INFORMATION, 2021, 12 (05)
  • [37] A comprehensive survey on deep learning based malware detection techniques
    Gopinath, M.
    Sethuraman, Sibi Chakkaravarthy
    [J]. COMPUTER SCIENCE REVIEW, 2023, 47
  • [38] A Survey on Different Approaches for Malware Detection Using Machine Learning Techniques
    Rani, S. Soja
    Reeja, S. R.
    [J]. SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 389 - 398
  • [39] A comprehensive survey on hardware-assisted malware analysis and primitive techniques
    Kumar, E. Praveen
    Priyanka, S.
    [J]. COMPUTER NETWORKS, 2023, 235
  • [40] A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks
    Roseline, S. Abijah
    Geetha, S.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 92