2019
DOI: 10.1016/j.eswa.2018.10.011
|View full text |Cite
|
Sign up to set email alerts
|

The arms race: Adversarial search defeats entropy used to detect malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(38 citation statements)
references
References 15 publications
0
38
0
Order By: Relevance
“…The process of extracting an entropy profile is based on Sorokin’s structural entropy method [ 8 ]. For a detailed description we reference Section 2 of [ 9 ], the following summarizes this process. The main three steps are: Partition the file in chunks, i.e., small parts of the same size, and calculate their entropy to generate an entropy sequence.…”
Section: Mimickav: Mimicking Anti-virus Softwarementioning
confidence: 99%
See 3 more Smart Citations
“…The process of extracting an entropy profile is based on Sorokin’s structural entropy method [ 8 ]. For a detailed description we reference Section 2 of [ 9 ], the following summarizes this process. The main three steps are: Partition the file in chunks, i.e., small parts of the same size, and calculate their entropy to generate an entropy sequence.…”
Section: Mimickav: Mimicking Anti-virus Softwarementioning
confidence: 99%
“…Suppose as the set of all chunks ( N chunks) after partitioning. Following the work of Sorokin [ 8 ] on entropy profiles and subsequent works [ 9 ], we consider the entropy at byte granularity, therefore we use the chunk string as a byte string, and calculate the probability of every byte inside the chunk to measure the Shannon entropy. The Shannon entropy, which measures the levels of randomness on data, for a specific chunk is computed as: where B is the set of all possible bytes ( b ) in the chunk string.…”
Section: Mimickav: Mimicking Anti-virus Softwarementioning
confidence: 99%
See 2 more Smart Citations
“…The authors carry out several studies and conclude that, by the time of 2015, the detection by the platforms present on VirusTotal site was worse in all cases. A more recent study also outperformed the VirusTotal in 2019 [ 78 ].…”
Section: Kolmogorov Complexity Application Scenariosmentioning
confidence: 99%