A survey on run-time packers and mitigation techniques

被引:0
|
作者
Ehab Alkhateeb
Ali Ghorbani
Arash Habibi Lashkari
机构
[1] University of New Brunswick,Canadian Institute for Cybersecurity, Faculty of Computer Science
[2] York University,Behaviour
关键词
Packed malware; Anti-virus; Multi-packing; Feature engineering; Machine learning;
D O I
暂无
中图分类号
学科分类号
摘要
The battle between malware analysts and malware authors is a never-ending challenge with the advent of complex malware such as polymorphic, metamorphic, and packed malware. A malware packer uses various techniques combined with file encryption to harden against reverse engineering of the program and hinder the analysis of program behaviors. In any case, substantial elements have emerged after more than a decade of continuous research in malware packer detection, such as multi-packing. Newly modified packers have this persistent problem, which demands new concepts and techniques. This study aims to provide a systematic and comprehensive review of run-time packers’ mitigation techniques. We provide different types of packers and propose a malware packer handling life cycle for AV engines. Furthermore, we deliver a modern malware packers classification features set by examining the feature engineering in the packing handling life-cycle, such as feature extraction techniques in machine learning approaches. Also, we present extensive related works and discuss each work’s benefits and weaknesses to address this problem, with a particular emphasis on packers identification techniques, to aid in unpacking malware. Finally, we identify the current gaps in knowledge and provide ideas about future work.
引用
收藏
页码:887 / 913
页数:26
相关论文
共 50 条
  • [1] A survey on run-time packers and mitigation techniques
    Alkhateeb, Ehab
    Ghorbani, Ali
    Lashkari, Arash Habibi
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 887 - 913
  • [2] SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers
    Ugarte-Pedrero, Xabier
    Balzarotti, Davide
    Santos, Igor
    Bringas, Pablo G.
    [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 659 - 673
  • [3] Techniques for reducing the overhead of run-time parallelization
    Yu, H
    Rauchwerger, L
    [J]. COMPILER CONSTRUCTION, PROCEEDINGS, 2000, 1781 : 232 - 248
  • [4] A Survey on Run-time Power Monitors at the Edge
    Zoni, Davide
    Galimberti, Andrea
    Fornaciari, William
    [J]. ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [5] Run-time Detection and Mitigation of Power-Noise Viruses
    Tenentes, Vasileios
    Das, Shidhartha
    Rossi, Daniele
    Al-Hashimi, Bashir M.
    [J]. 2019 IEEE 25TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2019), 2019, : 275 - 280
  • [6] Raindroid - A System for Run-time Mitigation of Android Intent Vulnerabilities
    Schmerl, Bradley
    Gennari, Jeffrey
    Camara, Javier
    Garlan, David
    [J]. SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, : 115 - 117
  • [7] Towards Generic Malware Unpacking: A Comprehensive Study on the Unpacking Behavior of Malicious Run-Time Packers
    Jenke, Thorsten
    Padilla, Elmar
    Bruckschen, Lilli
    [J]. SECURE IT SYSTEMS, NORDSEC 2023, 2024, 14324 : 245 - 262
  • [8] Evaluating run-time techniques for leakage power reduction
    Duarte, D
    Tsai, YF
    Vijaykrishnan, N
    Irwin, MJ
    [J]. ASP-DAC/VLSI DESIGN 2002: 7TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE AND 15TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS, 2002, : 31 - 38
  • [9] Run-time Reconfigurable Network-on-chip: a survey
    Kidane, Hiliwi Leake
    Bourennane, El-Bay
    [J]. 2018 15TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS AND DEVICES (SSD), 2018, : 846 - 851
  • [10] A survey of systems for detecting serial run-time errors
    Luecke, Glenn R.
    Coyle, James
    Hoekstra, Jim
    Kraeva, Marina
    Li, Ying
    Taborskaia, Olga
    Wang, Yanmei
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2006, 18 (15): : 1885 - 1907