Proposed Classification of Malware, Based on Obfuscation

被引:0
|
作者
Barria, Cristian [1 ]
Cubillos, Claudio [1 ]
Cordero, David [2 ]
Palma, Miguel [3 ]
机构
[1] Pontificia Univ Catolica Valparaiso, Valparaiso, Chile
[2] Univ Andres Bello, Santiago, Chile
[3] Univ Tecnol Chile, Santiago, Chile
关键词
Malware; obfuscation techniques; cyber space; antivirus;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware are the big threat within the digital world as they have a highly complex technological structure that is capable of penetrating networks, obtaining confidential information from personal computers and corporate systems, and even of making systems of critical infrastructure vulnerable. However, in order to achieve their objectives, they need to remain updated, so that they will not be detected by the different protection systems which re primarily antivirus. This investigation proposes a certain malware classification based on their obfuscation capacity, and also considering the methods, techniques, procedures and tools that a malicious code requires and that whose result suggests a general vision of the malware and its effective evasion in cyber space.
引用
收藏
页码:37 / 44
页数:8
相关论文
共 50 条
  • [1] Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification
    Duy-Phuc Pham
    Marion, Damien
    Mastio, Mathieu
    Heuser, Annelie
    [J]. 37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 706 - 719
  • [2] Obfuscation: The Hidden Malware
    O'Kane, Philip
    Sezer, Sakir
    McLaughlin, Kieran
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (05) : 41 - 47
  • [3] Obfuscation Code Localization Based on CFG Generation of Malware
    Nguyen Minh Hai
    Ogawa, Mizuhito
    Quan Thanh Tho
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 229 - 247
  • [4] Use of cryptography in malware obfuscation
    Asghar, Hassan Jameel
    Zhao, Benjamin Zi Hao
    Ikram, Muhammad
    Nguyen, Giang
    Kaafar, Dali
    Lamont, Sean
    Coscia, Daniel
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 135 - 152
  • [5] Use of cryptography in malware obfuscation
    Hassan Jameel Asghar
    Benjamin Zi Hao Zhao
    Muhammad Ikram
    Giang Nguyen
    Dali Kaafar
    Sean Lamont
    Daniel Coscia
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152
  • [6] Detection of obfuscation in java']java malware
    Kumar, Renuka
    Vaishakh, Anand Raj Essar
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
  • [7] Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)
    Jusoh, Rosmalissa
    Firdaus, Ahmad
    Anwar, Shahid
    Osman, Mohd Zamri
    Darmawan, Mohd Faaizie
    Ab Razak, Mohd Faizal
    [J]. PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 54
  • [8] Bypassing Malware Obfuscation with Dynamic Synthesis
    Biondi, Fabrizio
    Josse, Sebastien
    Legay, Axel
    [J]. ERCIM NEWS, 2016, (106): : 37 - +
  • [9] Plain Source Code Obfuscation as an Effective Attack Method on IoT Malware Image Classification
    Sato, Hayato
    Immure, Hiroshi
    Ishida, Shigemi
    Nakamura, Yoshitaka
    [J]. 2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 940 - 945
  • [10] Obfuscation-based Malware Update: A comparison of Manual and Automated Methods
    Barria, C.
    Cordero, D.
    Cubillos, C.
    Palma, M.
    Cabrera, D.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2017, 12 (04) : 461 - 474