2006
DOI: 10.1007/s11416-006-0028-7
|View full text |Cite
|
Sign up to set email alerts
|

Hunting for metamorphic engines

Abstract: In this paper, we analyze several metamorphic virus generators. We define a similarity index and use it to precisely quantify the degree of metamorphism that each generator produces. Then we present a detector based on hidden Markov models and we consider a simpler detection method based on our similarity index. Both of these techniques detect all of the metamorphic viruses in our test set with extremely high accuracy. In addition, we show that popular commercial virus scanners do not detect the highly metamor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

4
263
0
2

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 224 publications
(269 citation statements)
references
References 10 publications
4
263
0
2
Order By: Relevance
“…JavaScript: To mutate JavaScript files, the blinding service uses techniques that are adapted from metamorphic viruses [72]. Metamorphic viruses attempt to elude malware scanners by ensuring that each instantiation of the virus has syntactically different code that preserves the behavior of the base implementation.…”
Section: F Mutation Techniquesmentioning
confidence: 99%
“…JavaScript: To mutate JavaScript files, the blinding service uses techniques that are adapted from metamorphic viruses [72]. Metamorphic viruses attempt to elude malware scanners by ensuring that each instantiation of the virus has syntactically different code that preserves the behavior of the base implementation.…”
Section: F Mutation Techniquesmentioning
confidence: 99%
“…Unlike in [30], for example, we examine the raw bytes of a file without the need for code disassembly. We deviate from [3] by considering compression ratios as an alternative measurement of entropy.…”
Section: Figure 4: Ppm-based Classificationmentioning
confidence: 99%
“…G2 viruses are one of several well-known metamorphic families. The benign files we use to compare against the G2 viruses are 16 specific Cygwin utility files [11] chosen for their representation as non-virus files in previous papers such as [3,21,30]. The exact files included in the benign data set are shown in Table 3.…”
Section: Test Data 411 Second Generation Virus Generatormentioning
confidence: 99%
See 2 more Smart Citations