The Threat of Obfuscated Zero Day Polymorphic Malwares: An Analysis

作者: Brightstarlang Wanswett , Hemanta Kumar Kalita

DOI: 10.1109/CICN.2015.230

关键词:

摘要: When a Zero day malware crops up and with the advent of polymorphism obfuscation, such poses serious threat to unsuspecting victims attack. In this paper we will analyze current scenario that is obfuscated polymorphic in nature against different analysis tools employing techniques. A mutation engine created create key logger malware. On positive note, however, obfuscation technique can also be used make softwares are less vulnerable from unwanted distribution.

参考文章(18)
Jan Hurtuk, Marek Copjak, Marek Dufala, Pavol Drienik, The malicious code hiding techniques, code obfuscation problem international conference on emerging elearning technologies and applications. pp. 181- 185 ,(2014) , 10.1109/ICETA.2014.7107581
Imtithal A.Saeed, Ali Selamat, Ali M. A. Abuagoub, A survey on malware propagation, analysis, and detection International Journal of Computer Applications. ,vol. 67, pp. 25- 31 ,(2013) , 10.5120/11480-7108
Mohssen M.Z.E. Mohammed, H. Anthony Chan, Neco Ventura, Al-Sakib Khan Pathan, An Automated Signature Generation Method for Zero-Day Polymorphic Worms Based on Multilayer Perceptron Model international conference on advanced computer science applications and technologies. pp. 450- 455 ,(2013) , 10.1109/ACSAT.2013.94
Ratinder Kaur, Maninder Singh, Efficient hybrid technique for detecting zero-day polymorphic worms ieee international advance computing conference. pp. 95- 100 ,(2014) , 10.1109/IADCC.2014.6779301
Jean-Marie Borello, Ludovic Mé, Code obfuscation techniques for metamorphic viruses Journal in Computer Virology. ,vol. 4, pp. 211- 220 ,(2008) , 10.1007/S11416-008-0084-2
Fahad Bin Muhaya, Muhammad Khurram Khan, Yang Xiang, Polymorphic Malware Detection Using Hierarchical Hidden Markov Model ieee international conference on dependable, autonomic and secure computing. pp. 151- 155 ,(2011) , 10.1109/DASC.2011.47
Ratinder Kaur, Maninder Singh, A Survey on Zero-Day Polymorphic Worm Detection Techniques IEEE Communications Surveys and Tutorials. ,vol. 16, pp. 1520- 1549 ,(2014) , 10.1109/SURV.2014.022714.00160
Binh T. Nguyen, Binh T. Ngo, Tho T. Quan, A Memory-Based Abstraction Approach to Handle Obfuscation in Polymorphic Virus asia-pacific software engineering conference. ,vol. 2, pp. 158- 161 ,(2012) , 10.1109/APSEC.2012.78
Sudhir Kumar Pandey, B.M. Mehtre, Performance of malware detection tools: A comparison ieee international conference on advanced communications, control and computing technologies. pp. 1811- 1817 ,(2014) , 10.1109/ICACCCT.2014.7019422
Dawn Xiaodong Song, James Newsome, Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software network and distributed system security symposium. ,(2005)