Malware Pattern Scanning Schemes Secure Against Black-box Analysis

@article{Filiol2006MalwarePS,
  title={Malware Pattern Scanning Schemes Secure Against Black-box Analysis},
  author={Eric Filiol},
  journal={Journal in Computer Virology},
  year={2006},
  volume={2},
  pages={35-50}
}
As a general rule, copycats produce most of malware variants from an original malware strain. For this purpose, they widely perform black-box analyses of commercial scanners aiming at extracting malware detection patterns. In this paper, we first study the malware detection pattern extraction problem from a complexity point of view and provide the results of a wide-scale study of commercial scanners’ black-box analysis. These results clearly show that most of the tested commercial products fail… CONTINUE READING
BETA

Similar Papers

Tables and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 62 CITATIONS, ESTIMATED 88% COVERAGE

Web Information Systems Engineering – WISE 2015

  • Lecture Notes in Computer Science
  • 2015
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Auto-Sign: an automatic signature generator for high-speed malware filtering devices

  • Journal in Computer Virology
  • 2009
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

A statistical model for undecidable viral detection

  • Journal in Computer Virology
  • 2007
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Evaluation methodology and theoretical model for antiviral behavioural detection strategies

  • Journal in Computer Virology
  • 2006
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Using Markov chains to filter machine-morphed variants of malicious programs

  • 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE)
  • 2008
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

ANALYSING COMPILED BINARIES USING LOGIC

Thaís Moreira Hamasaki
  • 2018

Behavioral Malware Classification using Convolutional Recurrent Neural Networks

  • 2018 13th International Conference on Malicious and Unwanted Software (MALWARE)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

FILTER CITATIONS BY YEAR

2006
2018

CITATION STATISTICS

  • 5 Highly Influenced Citations

  • Averaged 2 Citations per year over the last 3 years

References

Publications referenced by this paper.
SHOWING 1-10 OF 23 REFERENCES

Testing malware detectors

VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

Advanced Computer Virology, IRIS International series

E. Filiol
  • Berlin Heidelberg New York: Springer
  • 2006

2004 information security breaches survey, UK Department of Trade and Industry, 2004

S. Stimms, C. Potter, A. Beard
  • Available at http://www.security-survey.gov.uk. A video presenting the report to the press as well as a summary for decision-makers are also available on this website
  • 2004
VIEW 1 EXCERPT