Detecting Packed Executables Based on Raw Binary Data
نویسندگان
چکیده
Packing an executable originally referred to the compression of the file to reduce its size on disk. Nowadays, packing also introduces encryption and anti-debug techniques to protect executables from reverse engineering. This explains why packers are extensively used in creating new malware variants which are not detected by traditional signature-based anti-malware tools. Although universal unpackers exist for extracting the executable code from packed files, they often rely on methods based on dynamic analysis, thus making them computationally expensive and time consuming. Hence, it is important to detect packed executables beforehand to avoid unnecessary computations so that only protected executables need be sent to the unpacker before further analysis. In this paper, we propose a new technique for fast identification of packed executables by analyzing only the raw binary data. We extract bigram-based features on packed and unpacked executables and use a support vector machine for training and testing. Experimental results reveal that we are able to correctly identify packed executables with a high detection rate in the range of 95%-98% for a variety of packers and crypters.
منابع مشابه
A Heuristics-based Static Analysis Approach for Detecting Packed PE Binaries
Malware authors evade the signature based detection by packing the original malware using custom packers. In this paper, we present a static heuristics based approach for the detection of packed executables. We present 1) the PE heuristics considered for analysis and taxonomy of heuristics; 2) a method for computing the score using power distance based on weights and risks assigned to the defin...
متن کاملStructural Feature Based Anomaly Detection for Packed Executable Identification
Malware is any software with malicious intentions. Commercial anti-malware software relies on signature databases. This approach has proven to be effective when the threats are already known. However, malware writers employ software encryption tools and code obfuscation techniques to hide the actual behaviour of their malicious programs. One of these techniques is executable packing, which cons...
متن کاملA scalable multi-level feature extraction technique to detect malicious executables
We present a scalable and multi-level feature extraction technique to detect malicious executables. We propose a novel combination of three different kinds of features at different levels of abstraction. These are binary n-grams, assembly instruction sequences, and Dynamic Link Library (DLL) function calls; extracted from binary executables, disassembled executables, and executable headers, res...
متن کاملClassification of packed executables for accurate computer virus detection
Executable packing is the most common technique used by computer virus writers to obfuscate malicious code and evade detection by anti-virus software. Universal unpackers have been proposed that can detect and extract encrypted code from packed executables, therefore potentially revealing hidden viruses that can then be detected by traditional signature-based anti-virus software. However, unive...
متن کاملAdversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables
Machine-learning methods have already been exploited as useful tools for detecting malicious executable files. They leverage data retrieved from malware samples, such as header fields, instruction sequences, or even raw bytes, to learn models that discriminate between benign and malicious software. However, it has also been shown that machine learning and deep neural networks can be fooled by e...
متن کامل