Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Revealing Packed Malware

Published: 01 September 2008 Publication History

Abstract

In concert with the ever-growing network applications, a significant increase in the spread of malware over the Internet has been observed. In cases where malware are the zero-day threats, generating their signatures for detection via anti-virus (AV) scan engines becomes an important reactive security function. However, modern malware can easily bypass AV scanners using packers, which can hide malicious file contents from detection. This article describes how packers work, and the three most commonly used unpacking methods. The authors describe the logic flow and behavior of Upack, a popular packer, as an example of a software packer.

Cited By

View all
  • (2023)On the feasibility of malware unpacking via hardware-assisted loop profilingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620656(7481-7498)Online publication date: 9-Aug-2023
  • (2022)Detecting Anomalous LAN Activities under Differential PrivacySecurity and Communication Networks10.1155/2022/14032002022Online publication date: 1-Jan-2022
  • (2022)File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for EnhancementsACM Computing Surveys10.1145/353081055:5(1-45)Online publication date: 3-Dec-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 6, Issue 5
September 2008
82 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 September 2008

Author Tags

  1. anti-virus
  2. basic training
  3. malware
  4. packer

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)On the feasibility of malware unpacking via hardware-assisted loop profilingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620656(7481-7498)Online publication date: 9-Aug-2023
  • (2022)Detecting Anomalous LAN Activities under Differential PrivacySecurity and Communication Networks10.1155/2022/14032002022Online publication date: 1-Jan-2022
  • (2022)File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for EnhancementsACM Computing Surveys10.1145/353081055:5(1-45)Online publication date: 3-Dec-2022
  • (2022)Ran$Net: An Anti-Ransomware Methodology based on Cache Monitoring and Deep LearningProceedings of the Great Lakes Symposium on VLSI 202210.1145/3526241.3530830(487-492)Online publication date: 6-Jun-2022
  • (2020)Detection of Metamorphic Malware Packers Using Multilayered LSTM NetworksInformation and Communications Security10.1007/978-3-030-61078-4_3(36-53)Online publication date: 24-Aug-2020
  • (2019)All-in-One Framework for Detection, Unpacking, and Verification for Malware AnalysisSecurity and Communication Networks10.1155/2019/52781372019Online publication date: 13-Oct-2019
  • (2018)Towards Paving the Way for Large-Scale Windows Malware AnalysisProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243771(395-411)Online publication date: 15-Oct-2018
  • (2018)Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems SecurityProceedings of the 2018 on Asia Conference on Computer and Communications Security10.1145/3196494.3196526(313-327)Online publication date: 29-May-2018
  • (2017)Packer identification based on metadata signatureProceedings of the 7th Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop10.1145/3151137.3160687(1-11)Online publication date: 5-Dec-2017
  • (2017)A Survey On Automated Dynamic Malware Analysis Evasion and Counter-EvasionProceedings of the 1st Reversing and Offensive-oriented Trends Symposium10.1145/3150376.3150378(1-21)Online publication date: 16-Nov-2017
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media