作者
Mamoun Alazab, Sitalakshmi Venkataraman, Paul Watters
发表日期
2010/7/19
研讨会论文
2010 second cybercrime and trustworthy computing workshop
页码范围
52-59
出版商
IEEE
简介
One of the recent trends adopted by malware authors is to use packers or software tools that instigate code obfuscation in order to evade detection by antivirus scanners. With evasion techniques such as polymorphism and metamorphism malware is able to fool current detection techniques. Thus, security researchers and the anti-virus industry are facing a herculean task in extracting payloads hidden within packed executables. It is a common practice to use manual unpacking or static unpacking using some software tools and analyse the application programming interface (API) calls for malware detection. However, extracting these features from the unpacked executables for reverse obfuscation is labour intensive and requires deep knowledge of low-level programming that includes kernel and assembly language. This paper presents an automated method of extracting API call features and analysing them in …
引用总数
2011201220132014201520162017201820192020202120222023202461416111317162124172119185
学术搜索中的文章
M Alazab, S Venkataraman, P Watters - 2010 second cybercrime and trustworthy computing …, 2010