Detecting and Classifying Morphed Malwares: A Survey

作者: Sanjam Singla , Ekta Gandotra , Divya Bansal , Sanjeev Sofat

DOI: 10.5120/21738-4937

关键词:

摘要: In this era, most of the antivirus companies are facing immense difficulty in detecting morphed malwares as they conceal themselves from detection. Malwares use various techniques to camouflage so increase their lifetime. These obscure methods cannot completely impede analysis, but it prolongs process analysis and This paper presents a review on malware detection systems progress made advanced which will serve reference researchers interested working advance systems.

参考文章(44)
M. Christodorescu, S. Jha, S.A. Seshia, D. Song, R.E. Bryant, Semantics-aware malware detection ieee symposium on security and privacy. pp. 32- 46 ,(2005) , 10.1109/SP.2005.20
Felix Leder, Bastian Steinbock, Peter Martini, Classification and detection of metamorphic malware using value set analysis international conference on malicious and unwanted software. pp. 39- 46 ,(2009) , 10.1109/MALWARE.2009.5403019
Muazzam Siddiqui, Morgan C. Wang, Joohan Lee, A survey of data mining techniques for malware detection using file features acm southeast regional conference. pp. 509- 510 ,(2008) , 10.1145/1593105.1593239
Tao Gong, Xiaobin Tan, Ming Zhu, Malware Detection via Classifying with Compression international conference on information science and engineering. pp. 1765- 1768 ,(2009) , 10.1109/ICISE.2009.726
Md. Enamul. Karim, Andrew Walenstein, Arun Lakhotia, Laxmi Parida, Malware Phylogeny Generation using Permutations of Code Journal in Computer Virology. ,vol. 1, pp. 13- 23 ,(2005) , 10.1007/S11416-005-0002-9
Thomas H. Austin, Eric Filiol, Sebastien Josse, Mark Stamp, Exploring Hidden Markov Models for Virus Analysis: A Semantic Approach hawaii international conference on system sciences. pp. 5039- 5048 ,(2013) , 10.1109/HICSS.2013.217
Babak Bashari Rad, Suhaimi Ibrahim, Maslin Masrom, Camouflage in Malware: from Encryption to Metamorphism International Journal of Computer Science and Network Security. ,(2012)
Scott Treadwell, Mian Zhou, A heuristic approach for detection of obfuscated malware intelligence and security informatics. pp. 291- 299 ,(2009) , 10.1109/ISI.2009.5137328
Da Lin, Mark Stamp, Hunting for undetectable metamorphic viruses Journal of Computer Virology and Hacking Techniques. ,vol. 7, pp. 201- 214 ,(2011) , 10.1007/S11416-010-0148-Y
Mohamed R. Chouchane, Arun Lakhotia, Using engine signature to detect metamorphic malware Proceedings of the 4th ACM workshop on Recurring malcode - WORM '06. pp. 73- 78 ,(2006) , 10.1145/1179542.1179558