2010 5th International Conference on Malicious and Unwanted Software 2010
DOI: 10.1109/malware.2010.5665789
|View full text |Cite
|
Sign up to set email alerts
|

Generic unpacking using entropy analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 34 publications
(22 citation statements)
references
References 7 publications
0
21
0
1
Order By: Relevance
“…Packing algorithms are the double-edged sword; they are extensively used in packing malware (Jeong et al [33], Ugarte-Pedrero et al [25], Bat-Erdene et al [2]) and are also responsible for protecting genuine software from reverse engineering. A packed executable has an encoded data section.…”
Section: To Use Packing Algorithms Benign and Malwarè`mentioning
confidence: 99%
See 1 more Smart Citation
“…Packing algorithms are the double-edged sword; they are extensively used in packing malware (Jeong et al [33], Ugarte-Pedrero et al [25], Bat-Erdene et al [2]) and are also responsible for protecting genuine software from reverse engineering. A packed executable has an encoded data section.…”
Section: To Use Packing Algorithms Benign and Malwarè`mentioning
confidence: 99%
“…Entropy is a method for measuring uncertainty in a series of information units (Jeong et al [33], Bat-Erdene et al [2] and Vapnik et al [41,42]). Measuring the entropy pattern during unpacking process refers to determining the entropy value of re-packed or multi-layer packed executable.…”
Section: Entropy Analysis and Measurementmentioning
confidence: 99%
“…Packer [5,6] là một công cụ phần mềm dùng để đóng gói một tập tin. Packer có 3 mục tiêu cụ thể đƣợc mô tả nhƣ sau.…”
Section: A Giới Thiệu Packerunclassified
“…Benninger et al [22] and Deng et al [23] independently propose that type of analysis environments by customizing Xen and KVM, respectively. Kawakoya et al [10] focus on memory access 'write', 'read', and 'execute' of packed programs to detect the OEP, and Jeong et al [24] focus on entropy scores in each section of a packed program on the memory to do so. Kim et al [11] focus on a write-execute transition to spot more likely OEP candidates.…”
Section: Related Workmentioning
confidence: 99%