Proceedings of the 36th Annual ACM Symposium on Applied Computing 2021
DOI: 10.1145/3412841.3442039
|View full text |Cite
|
Sign up to set email alerts
|

FUMVar

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…However, most existing techniques do not ensure that the generated variants' behaviors are identical to the original malware sample's behaviors. Jin et al [11] proposed the framework called FUMVar using a genetic algorithm (GA) with a fitness score function that uses a publicly available malware detection system named VirusTotal 1 to generate more evasive malware variants against commercial malware detectors. In contrast to previous works, the generated malware variants' functional behaviors are kept identical to the original malware's, achieved by analyzing them with the Cuckoo sandbox as ensured by FUMVar.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…However, most existing techniques do not ensure that the generated variants' behaviors are identical to the original malware sample's behaviors. Jin et al [11] proposed the framework called FUMVar using a genetic algorithm (GA) with a fitness score function that uses a publicly available malware detection system named VirusTotal 1 to generate more evasive malware variants against commercial malware detectors. In contrast to previous works, the generated malware variants' functional behaviors are kept identical to the original malware's, achieved by analyzing them with the Cuckoo sandbox as ensured by FUMVar.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we extend and improve FUMVar [11] into a more effective and practical one dubbed FUMVar-Ex with (1) new perturbations reflecting the techniques used to generate real-world malware samples (2) a new malware behavior validation method using aggregated evaluation that improves the validation of generated malware variants' functionality and their equivalence to the original malware samples, and (3) more comprehensive experiments and improved results using FUMVar-Ex compared with FUMVar and other stateof-the-art techniques. For the first extension, we introduce new perturbation techniques modifying portable executable (PE) sections directly, whereas, in FUMVar, we only implemented the perturbation methods that only modified a few bytes of the header field, which did not reflect more complex malware perturbation methods used in practice.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations