Use of cryptography in malware obfuscation

被引:2
|
作者
Asghar, Hassan Jameel [1 ]
Zhao, Benjamin Zi Hao [1 ]
Ikram, Muhammad [1 ]
Nguyen, Giang [1 ]
Kaafar, Dali [1 ]
Lamont, Sean [2 ]
Coscia, Daniel [2 ]
机构
[1] Macquarie Univ, Sydney, Australia
[2] Def Sci & Technol Grp, Adelaide, Australia
关键词
Malware obfuscation; Malware detection; Cryptography; Environmental keying;
D O I
10.1007/s11416-023-00504-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection. Use of cryptography may give the impression that these obfuscation techniques have some provable guarantees of success. In this paper, we take a closer look at the use of cryptographic tools to obfuscate malware. We first find that most techniques are easy to defeat (in principle), since the decryption algorithm and the key is shipped within the program. In order to clearly define an obfuscation technique's potential to evade detection we propose a principled definition of malware obfuscation, and then categorize instances of malware obfuscation that use cryptographic tools into those which evade detection and those which are detectable. We find that schemes that are hard to de-obfuscate necessarily rely on a construct based on environmental keying. We also show that cryptographic notions of obfuscation, e.g., indistinghuishability and virtual black box obfuscation, may not guarantee evasion detection under our model. However, they can be used in conjunction with environmental keying to produce hard to de-obfuscate version of programs.
引用
收藏
页码:135 / 152
页数:18
相关论文
共 50 条
  • [1] Use of cryptography in malware obfuscation
    Hassan Jameel Asghar
    Benjamin Zi Hao Zhao
    Muhammad Ikram
    Giang Nguyen
    Dali Kaafar
    Sean Lamont
    Daniel Coscia
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152
  • [2] Obfuscation: The Hidden Malware
    O'Kane, Philip
    Sezer, Sakir
    McLaughlin, Kieran
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (05) : 41 - 47
  • [3] Program obfuscation by strong cryptography
    Vrba, Zeljko
    Halvorsen, Pal
    Griwodz, Carsten
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 242 - 247
  • [4] Proposed Classification of Malware, Based on Obfuscation
    Barria, Cristian
    Cubillos, Claudio
    Cordero, David
    Palma, Miguel
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 37 - 44
  • [5] Detection of obfuscation in java']java malware
    Kumar, Renuka
    Vaishakh, Anand Raj Essar
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
  • [6] Bypassing Malware Obfuscation with Dynamic Synthesis
    Biondi, Fabrizio
    Josse, Sebastien
    Legay, Axel
    [J]. ERCIM NEWS, 2016, (106): : 37 - +
  • [7] Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation
    Koutsokostas, Vasilios
    Patsakis, Constantinos
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 125 - 136
  • [8] Malware Obfuscation Measuring via Evolutionary Similarity
    Li, Jian
    Xu, Jun
    Xu, Ming
    Zhao, HengLi
    Zheng, Ning
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 197 - +
  • [9] Malware Obfuscation Detection via Maximal Patterns
    Li, Jian
    Xu, Ming
    Zheng, Ning
    Xu, Jian
    [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 2, PROCEEDINGS, 2009, : 324 - 328
  • [10] On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography
    Bitansky, Nir
    Paneth, Omer
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 241 - 250