Obfuscation: The Hidden Malware

被引:112
|
作者
O'Kane, Philip [1 ]
Sezer, Sakir [1 ]
McLaughlin, Kieran [1 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast BT7 1NN, Antrim, North Ireland
基金
英国工程与自然科学研究理事会;
关键词
computer security; malware; metamorphism; obfuscation; packer; polymorphism;
D O I
10.1109/MSP.2011.98
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of malware, undermine antimalware software, and thwart malware analysis. Malware writers use packers, polymorphic techniques, and metamorphic techniques to evade intrusion detection systems. The need exists for new antimalware approaches that focus on what malware is doing rather than how it's doing it. © 2011 IEEE.
引用
收藏
页码:41 / 47
页数:7
相关论文
共 50 条
  • [1] Profile Hidden Markov Model Malware Detection and API Call Obfuscation
    Ali, Muhammad
    Hamid, Monem
    Jasser, Jacob
    Lerman, Joachim
    Shetty, Samod
    Di Troia, Fabio
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 688 - 695
  • [2] Use of cryptography in malware obfuscation
    Asghar, Hassan Jameel
    Zhao, Benjamin Zi Hao
    Ikram, Muhammad
    Nguyen, Giang
    Kaafar, Dali
    Lamont, Sean
    Coscia, Daniel
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 135 - 152
  • [3] Use of cryptography in malware obfuscation
    Hassan Jameel Asghar
    Benjamin Zi Hao Zhao
    Muhammad Ikram
    Giang Nguyen
    Dali Kaafar
    Sean Lamont
    Daniel Coscia
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 135 - 152
  • [4] Proposed Classification of Malware, Based on Obfuscation
    Barria, Cristian
    Cubillos, Claudio
    Cordero, David
    Palma, Miguel
    [J]. 2016 6TH INTERNATIONAL CONFERENCE ON COMPUTERS COMMUNICATIONS AND CONTROL (ICCCC), 2016, : 37 - 44
  • [5] Detection of obfuscation in java']java malware
    Kumar, Renuka
    Vaishakh, Anand Raj Essar
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 521 - 529
  • [6] Bypassing Malware Obfuscation with Dynamic Synthesis
    Biondi, Fabrizio
    Josse, Sebastien
    Legay, Axel
    [J]. ERCIM NEWS, 2016, (106): : 37 - +
  • [7] Python']Python and Malware: Developing Stealth and Evasive Malware without Obfuscation
    Koutsokostas, Vasilios
    Patsakis, Constantinos
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 125 - 136
  • [8] Malware Obfuscation Measuring via Evolutionary Similarity
    Li, Jian
    Xu, Jun
    Xu, Ming
    Zhao, HengLi
    Zheng, Ning
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON FUTURE INFORMATION NETWORKS, 2009, : 197 - +
  • [9] Malware Obfuscation Detection via Maximal Patterns
    Li, Jian
    Xu, Ming
    Zheng, Ning
    Xu, Jian
    [J]. 2009 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL 2, PROCEEDINGS, 2009, : 324 - 328
  • [10] MoG: Behavior-Obfuscation Resistance Malware Detection
    Cheng, Binlin
    Liu, Jinjun
    Chen, Jiejie
    Shi, Shudong
    Peng, Xufu
    Zhang, Xingwen
    Hai, Haiqing
    [J]. Computer Journal, 2019, 62 (12): : 1734 - 1747