metamorphic malware
Recently Published Documents


TOTAL DOCUMENTS

86
(FIVE YEARS 7)

H-INDEX

12
(FIVE YEARS 0)

Author(s):  
Chandini S B

Malware is the name for a malicious variants. Malware models conatins code generated by cyberattackers, plan to cause distrupt to data and systems or to gain unauthorized access to a network. Malware have been enormously increasing in now a days. Majority of malware utilize obfuscation methods for avoidance and abstruse motive, but they conserve the purpose and malicious behaviour of native Rey. Attackers uses metamorphic techniques to build viruses that change their internal construction all bug. Malware signatures and behaviour samples acquire static and dynamic analysis that are ineffectual in recognising undetermine malwares.In general,these metamorphic viruses are very hard to detect. In this paper, we suggest HMM as a novel solution for metamorphic detection.


2021 ◽  
Vol 104 ◽  
pp. 102216
Author(s):  
Yeong Tyng Ling ◽  
Nor Fazlida Mohd Sani ◽  
Mohd. Taufik Abdullah ◽  
Nor Asilah Wati Abdul Hamid

Author(s):  
Marco Campion ◽  
Mila Dalla Preda ◽  
Roberto Giacobazzi

AbstractMetamorphic malware are self-modifying programs which apply semantic preserving transformations to their own code in order to foil detection systems based on signature matching. Metamorphism impacts both software security and code protection technologies: it is used by malware writers to evade detection systems based on pattern matching and by software developers for preventing malicious host attacks through software diversification. In this paper, we consider the problem of automatically extracting metamorphic signatures from the analysis of metamorphic malware variants. We define a metamorphic signature as an abstract program representation that ideally captures all the possible code variants that might be generated during the execution of a metamorphic program. For this purpose, we developed MetaSign: a tool that takes as input a collection of metamorphic code variants and produces, as output, a set of transformation rules that could have been used to generate the considered metamorphic variants. MetaSign starts from a control flow graph representation of the input variants and agglomerates them into an automaton which approximates the considered code variants. The upper approximation process is based on the concept of widening automata, while the semantic preserving transformation rules, used by the metamorphic program, can be viewed as rewriting rules and modeled as grammar productions. In this setting, the grammar recognizes the language of code variants, while the production rules model the metamorphic transformations. In particular, we formalize the language of code variants in terms of pure context-free grammars, which are similar to context-free grammars with no terminal symbols. After the widening process, we create a positive set of samples from which we extract the productions of the grammar by applying a learning grammar technique. This allows us to learn the transformation rules used by the metamorphic engine to generate the considered code variants. We validate the results of MetaSign on some case studies.


2021 ◽  
Vol 71 (1) ◽  
pp. 55-65
Author(s):  
Mohit Sewak ◽  
Sanjay K. Sahay ◽  
Hemant Rathore

In this paper, we propose a novel mechanism to normalise metamorphic and obfuscated malware down at the opcode level and hence create an advanced metamorphic malware de-obfuscation and defence system. We name this system as DRLDO, for deep reinforcement learning based de-obfuscator. With the inclusion of the DRLDO as a sub-component, an existing Intrusion Detection System could be augmented with defensive capabilities against ‘zero-day’ attack from obfuscated and metamorphic variants of existing malware. This gains importance, not only because there exists no system till date that use advance DRL to intelligently and automatically normalise obfuscation down even to the opcode level, but also because the DRLDO system does not mandate any changes to the existing IDS. The DRLDO system does not even mandate the IDS’ classifier to be retrained with any new dataset containing obfuscated samples. Hence DRLDO could be easily retrofitted into any existing IDS deployment. We designed, developed, and conducted experiments on the system to evaluate the same against multiple-simultaneous attacks from obfuscations generated from malware samples from a standardised dataset that contain multiple generations of malware. Experimental results prove that DRLDO was able to successfully make the otherwise undetectable obfuscated variants of the malware detectable by an existing pre-trained malware classifier. The detection probability was raised well above the cut-off mark to 0.6 for the classifier to detect the obfuscated malware unambiguously. Further, the de-obfuscated variants generated by DRLDO achieved a very high correlation (of ≈ 0.99) with the base malware. This observation validates that the DRLDO system is actually learning to de-obfuscate and not exploiting a trivial trick.


2020 ◽  
Vol 71 ◽  
pp. 103443
Author(s):  
Arzu Gorgulu Kakisim ◽  
Mert Nar ◽  
Ibrahim Sogukpinar
Keyword(s):  

2020 ◽  
Vol 6 ◽  
pp. e285 ◽  
Author(s):  
Ferhat Ozgur Catak ◽  
Ahmet Faruk Yazı ◽  
Ogerta Elezaj ◽  
Javed Ahmed

Malware development has seen diversity in terms of architecture and features. This advancement in the competencies of malware poses a severe threat and opens new research dimensions in malware detection. This study is focused on metamorphic malware, which is the most advanced member of the malware family. It is quite impossible for anti-virus applications using traditional signature-based methods to detect metamorphic malware, which makes it difficult to classify this type of malware accordingly. Recent research literature about malware detection and classification discusses this issue related to malware behavior. The main goal of this paper is to develop a classification method according to malware types by taking into consideration the behavior of malware. We started this research by developing a new dataset containing API calls made on the windows operating system, which represents the behavior of malicious software. The types of malicious malware included in the dataset are Adware, Backdoor, Downloader, Dropper, spyware, Trojan, Virus, and Worm. The classification method used in this study is LSTM (Long Short-Term Memory), which is a widely used classification method in sequential data. The results obtained by the classifier demonstrate accuracy up to 95% with 0.83 $F_1$-score, which is quite satisfactory. We also run our experiments with binary and multi-class malware datasets to show the classification performance of the LSTM model. Another significant contribution of this research paper is the development of a new dataset for Windows operating systems based on API calls. To the best of our knowledge, there is no such dataset available before our research. The availability of our dataset on GitHub facilitates the research community in the domain of malware detection to benefit and make a further contribution to this domain.


Sign in / Sign up

Export Citation Format

Share Document