2012
DOI: 10.4028/www.scientific.net/amm.198-199.343
|View full text |Cite
|
Sign up to set email alerts
|

Unpacking Techniques and Tools in Malware Analysis

Abstract: Nowadays most of malware samples are packed with runtime packers to complicate the task of reverse engineering and security analysis in order to evade detection of signature-based anti-virus engines. In the overall process of malware analysis, unpacking a packed malicious binary effectively is a necessary preliminary to extract the structure features from the binary for generation of its signature, and therefore several unpacking techniques have been proposed so far that attempt to deal with the packer problem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…Although these approaches mentioned above, mainly built on manually crafted detection patterns, are efficient and scalable, generally speaking, they are not available for new malware instances. More and more malwares adopt measures such as: shell protection [ 19 ], polymorphism [20], encryption [21], or packing [22], which make the analysis and detection of Android malware rather tough.…”
Section: Introductionmentioning
confidence: 99%
“…Although these approaches mentioned above, mainly built on manually crafted detection patterns, are efficient and scalable, generally speaking, they are not available for new malware instances. More and more malwares adopt measures such as: shell protection [ 19 ], polymorphism [20], encryption [21], or packing [22], which make the analysis and detection of Android malware rather tough.…”
Section: Introductionmentioning
confidence: 99%