YAMME: a YAra-byte-signatures Metamorphic Mutation Engine

نویسندگان

چکیده

Recognition of known malicious patterns through signature-based systems is unsuccessful against malware for which no signature exists to identify them. These include not only zero-day but also software able self-replicate rewriting its own code leaving unaffected execution, namely metamorphic malware. YARA a popular analysis tool that uses the so-called YARA-rules, are built match contents within files or network packets analyzed by an Anti-Virus engine. Sometimes such content expressed in form byte-signature, i.e., sequence operational machine-level code. However, these can be bypassed since obfuscation techniques change sequences, them several equivalent forms. This paper presents YAMME, YARA-byte-signatures Metamorphic Mutation Engine strengthen rules some deployed mutation engines. First, it rewrites YARA-bye-signatures ways, as engine would do. Second, optimization phase exploits YARA-rules syntax constructs provide formats, making suitable different real-world application requirements. YAMME have been evaluated on MWOR, G2, NGVCK, and MetaNG datasets, resulting better detection rate than achieved generated AutoYara. Furthermore, computational overhead required formats validates low impact introduced at level.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BaSE (Byte addressable Storage Engine) Access Method

Non-Volatile Memory (NVM) is an emerging memory technology that combines the best properties of today’s hard disks and today’s main memory by combining non-volatility, high density, high speed, and byte addressability. This provides an opportunity to redesign systems and their software stacks to improve performance and to reduce the system and software complexity. Present-day database systems a...

متن کامل

BaSE(Byte addressable Storage Engine) Transaction Manager

Non-Volatile Memory (NVM) is an emerging memory technology that combines the best properties of current hard disks and main memories by providing non-volatility, high density, high speed, and byte addressability. This provides an opportunity to redesign systems and their software stacks to improve performance and to reduce the complexity. Present-day database systems are designed and optimized ...

متن کامل

Intelligence-Driven Incident Response with YARA

Given the current cyber threat landscape, organizations are now beginning to acknowledge the inexorable law that decrees that they will be compromised. Threat actors’ tactics, techniques, and procedures demand intelligence-driven incident response, which in turn, depend upon methodologies capable of yielding actionable threat intelligence in order to adapt to each threat. The process to develop...

متن کامل

Yara Parser: A Fast and Accurate Dependency Parser

Dependency parsers are among the most crucial tools in natural language processing as they have many important applications in downstream tasks such as information retrieval, machine translation and knowledge acquisition. We introduce the Yara Parser, a fast and accurate open-source dependency parser based on the arc-eager algorithm and beam search. It achieves an unlabeled accuracy of 93.32 on...

متن کامل

A metamorphic lesion.

uestion: A 65-year-old Caucasian woman presented at he emergency room with acute hematemesis. She reerred a short episode of oral bleeding 2 weeks before and omplained of solids nonprogressive dysphagia over the ast month. She was hemodynamically stable under inoropic support therapy, and a first endoscopic evaluation as performed (Figure A), where it was possible to idenify the bleeding origin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2023

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2023.3294059