Corpus ID: 55244028

Camouflage in Malware: from Encryption to Metamorphism

@inproceedings{Rad2012CamouflageIM,
  title={Camouflage in Malware: from Encryption to Metamorphism},
  author={B. Rad and M. Masrom and S. Ibrahim},
  year={2012}
}
  • B. Rad, M. Masrom, S. Ibrahim
  • Published 2012
  • Engineering
  • Summary Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the process of analyzing and detection prolonged, so the malware can get more time to widely spread. It is very important for antivirus technologies to improve their… CONTINUE READING
    103 Citations

    Figures and Tables from this paper.

    Obfuscation procedure based on the insertion of the dead code in the crypter by binary search
    Obfuscation procedure based in dead code insertion into crypter
    • 7
    • Highly Influenced
    Effective methods to detect metamorphic malware: a systematic review
    • 8
    • PDF
    Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
    • 27
    • Highly Influenced
    • PDF
    Obfuscation-based Malware Update: A comparison of Manual and Automated Methods
    • 1
    • PDF
    Detecting and Classifying Morphed Malwares: A Survey
    • 3
    Systems in Danger: A Short Review on Metamorphic Computer Viruses
    • 1
    Malware Detection and Evasion with Machine Learning Techniques : A Survey
    • 6
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 20 REFERENCES
    Obfuscation: The Hidden Malware
    • 146
    Mechanisms of Polymorphic and Metamorphic Viruses
    • 33
    Malware Obfuscation Techniques: A Brief Survey
    • Ilsun You, Kangbin Yim
    • Computer Science
    • 2010 International Conference on Broadband, Wireless Computing, Communication and Applications
    • 2010
    • 349
    • PDF
    The Design Space of Metamorphic Malware
    • 30
    • PDF
    Code obfuscation techniques for metamorphic viruses
    • 143
    • PDF
    Deobfuscation of virtualization-obfuscated software: a semantics-based approach
    • 104
    • PDF
    Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
    • 33
    • PDF
    Detecting Obfuscated Viruses Using Cosine Similarity Analysis
    • 60
    Impeding Malware Analysis Using Conditional Code Obfuscation
    • 224
    • PDF
    Unpacking virtualization obfuscators
    • 116
    • PDF