A survey on run-time packers and mitigation techniques

被引:0
|
作者
Ehab Alkhateeb
Ali Ghorbani
Arash Habibi Lashkari
机构
[1] University of New Brunswick,Canadian Institute for Cybersecurity, Faculty of Computer Science
[2] York University,Behaviour
关键词
Packed malware; Anti-virus; Multi-packing; Feature engineering; Machine learning;
D O I
暂无
中图分类号
学科分类号
摘要
The battle between malware analysts and malware authors is a never-ending challenge with the advent of complex malware such as polymorphic, metamorphic, and packed malware. A malware packer uses various techniques combined with file encryption to harden against reverse engineering of the program and hinder the analysis of program behaviors. In any case, substantial elements have emerged after more than a decade of continuous research in malware packer detection, such as multi-packing. Newly modified packers have this persistent problem, which demands new concepts and techniques. This study aims to provide a systematic and comprehensive review of run-time packers’ mitigation techniques. We provide different types of packers and propose a malware packer handling life cycle for AV engines. Furthermore, we deliver a modern malware packers classification features set by examining the feature engineering in the packing handling life-cycle, such as feature extraction techniques in machine learning approaches. Also, we present extensive related works and discuss each work’s benefits and weaknesses to address this problem, with a particular emphasis on packers identification techniques, to aid in unpacking malware. Finally, we identify the current gaps in knowledge and provide ideas about future work.
引用
收藏
页码:887 / 913
页数:26
相关论文
共 50 条
  • [41] RUN-TIME DIAGNOSTICS IN PASCAL
    WHITE, NH
    BENNETT, KH
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1985, 15 (04): : 359 - 367
  • [42] On the effectiveness of run-time checks
    van der Meulen, MJP
    Strigini, L
    Revilla, MA
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 151 - 164
  • [43] RUN-TIME DECLARATION ELABORATION
    FAUST, D
    [J]. SIGPLAN NOTICES, 1984, 19 (03): : 32 - 38
  • [44] A run-time system for WCL
    Rowstron, A
    Wray, S
    [J]. INTERNET PROGRAMMING LANGUAGES, PROCEEDINGS, 1999, 1686 : 78 - 96
  • [45] Run-time Coarse-Grained Hardware Mitigation for Multiple Faults on VLIW Processors
    Psiakis, Rafail
    Kritikakou, Angeliki
    Sentieys, Olivier
    Casseau, Emmanuel
    [J]. 2019 CONFERENCE ON DESIGN AND ARCHITECTURES FOR SIGNAL AND IMAGE PROCESSING (DASIP), 2019, : 23 - 28
  • [46] Run-Time Techniques for Exploiting Irregular Task Parallelism on Distributed Memory Architectures
    Fu, C.
    Yang, T.
    [J]. Journal of Parallel and Distributed Computing, 42 (02):
  • [47] Run-Time and Task-Based Performance of Event Detection Techniques for Twitter
    Weiler, Andreas
    Grossniklaus, Michael
    Scholl, Marc H.
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2015, 2015, 9097 : 35 - 49
  • [48] Hardware Trojan Detection at Run-time Using Machine-Learning Techniques
    Chakrabarty, Krishnendu
    [J]. 2020 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION AND TEST (VLSI-DAT), 2020,
  • [49] Run-time techniques for exploiting irregular task parallelism on distributed memory architectures
    Fu, C
    Yang, T
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 1997, 42 (02) : 143 - 156
  • [50] Run-Time Monitoring of Machine Learning for Robotic Perception: A Survey of Emerging Trends
    Rahman, Quazi Marufur
    Corke, Peter
    Dayoub, Feras
    [J]. IEEE ACCESS, 2021, 9 : 20067 - 20075