4.5 Article

On the adoption of anomaly detection for packed executable filtering

期刊

COMPUTERS & SECURITY
卷 43, 期 -, 页码 126-144

出版社

ELSEVIER ADVANCED TECHNOLOGY
DOI: 10.1016/j.cose.2014.03.012

关键词

Malware; Packer; Anomaly detection; Machine-learning; Computer security

资金

  1. Basque Government under a pre-doctoral grant given to Xabier Ugarte- Pedrero [PRE_2013_2_65]
  2. OTRI/Deiker at the University of Deusto under a predoctoral grant given to Ivan Garcia-Ferreira

向作者/读者索取更多资源

Malware packing is a common technique employed to hide malicious code and to avoid static analysis. In order to fully inspect the contents of the executable, unpacking techniques must be applied. Unfortunately, generic unpacking is computationally expensive. For this reason, it is important to filter binaries in order to correctly handle them. In previous work, we proposed the adoption of anomaly detection for the classification of packed and not packed binaries using features based on the Portable Executable structure. In this paper, we extend this work and thoroughly evaluate the method with a different dataset and two different feature sets, rendering new conclusions. While anomaly detection is reaffirmed as a sound method for the discrimination of packed and not packed binaries, Portable Executable structure based features present limitations to distinguish custom packed files from not packed files. (C) 2014 Elsevier Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据