2013
DOI: 10.1109/tc.2012.65
|View full text |Cite
|
Sign up to set email alerts
|

Malwise—An Effective and Efficient Classification System for Packed and Polymorphic Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 80 publications
(31 citation statements)
references
References 23 publications
0
31
0
Order By: Relevance
“…Symantec Research Laboratories (Osaghae et al [8], Al-Anezi et al [19], Santos et al [20] and McAfee [21]), over 80% of malware appears to be produced using a packer to circumvent anti-malware systems; furthermore, more than 50% of new malware are re-packed versions of existing malware [19,20,22]. If the packed malware [23,24] is re-packed or multi-layer packed a detection of its infection through signature matching is impossible [2,[25][26][27][28][29][30][31][32].…”
Section: Multi-layer Packingmentioning
confidence: 99%
“…Symantec Research Laboratories (Osaghae et al [8], Al-Anezi et al [19], Santos et al [20] and McAfee [21]), over 80% of malware appears to be produced using a packer to circumvent anti-malware systems; furthermore, more than 50% of new malware are re-packed versions of existing malware [19,20,22]. If the packed malware [23,24] is re-packed or multi-layer packed a detection of its infection through signature matching is impossible [2,[25][26][27][28][29][30][31][32].…”
Section: Multi-layer Packingmentioning
confidence: 99%
“…The prominent techniques tailored to extract dynamic features are n-gram analysis [16], non-transient state changes [5], taint analysis [6,30], system call trace analysis [18,7,9], and API calls [27,8]. Dynamic approaches can further be categorized into fine-grained (e.g., [6,30,15]) and coarse-grained (e.g., [9]) behavior modeling approaches.…”
Section: Related Workmentioning
confidence: 99%
“…Targeted vulnerability in the LNK process and will make use of WebDAV to run the exploit [8][9] using Metasploit framework to exploit the vulnerability [8] [9]. Metasploit framework is an open source tool which is being used extensively as the most popular tool of choice for the security experts and researchers across the security community.…”
Section: ) Browser Based Exploitationmentioning
confidence: 99%
“…Our target executable is putty.exe which is completely harmless software, which we have used for our demonstration purpose. Our objective here is to show how exploit codes specially crafted according to any particular vulnerability [9] specific to any application can be deployed by malware writers and what are the difficulties & challenges faced at different level of this multi-staged attack. These kind of applications are targeted by the malware writers in a multi-staged attack where the malware server hosts the exploit-kit containing the exploits for the specific target based on the type of application to be targeted and lure the victim to download or click on a link or an embedded image as shown in our experimentation.…”
Section: Analysis Of Malware Propagation Model Parametersmentioning
confidence: 99%
See 1 more Smart Citation