[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors

  • Conference paper
  • First Online:
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2024)

Abstract

Nowadays, executable packing remains an open issue in its detection especially when it comes to static analysis. Packing is significantly used in malware to hide malicious code from detection systems. These last years, many studies about static packing detection addressed this problem with heuristics and machine learning, considering different ad hoc techniques, algorithms and feature sets but very few addressed it from the adversarial point of view, that is, how to fool heuristics by altering samples with targeted modifications. The objective of this work is to study to what extent it is easy to evade detection by open source static detectors that are commonly used by the community by applying alterations on packed samples, which require only slight adaptations of the related packers, resulting in evasion. An adversarial setting from the problem-space perspective is addressed by using realistic modifications of binary samples that target common significant features. For this purpose, alterations and datasets are composed and static detection is applied using the experimental toolkit Packing Box. Results of alterations are shown, in terms of information gain of features and accuracy of detection, on open source static packing detectors. Finally, their significant effects are highlighted and their effectiveness is evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 79.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 69.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Yet Another Markup Language.

References

  1. Anderson, H.S., Kharkar, A., Filar, B., Evans, D., Roth, P.: Learning to evade static PE machine learning malware models via reinforcement learning (2018)

    Google Scholar 

  2. Bat-Erdene, M., Park, H., Li, H., Lee, H., Choi, M.S.: Entropy analysis to classify unknown packing algorithms for malware detection. Int. J. Inf. Secur. 16, 227–248 (2016)

    Article  Google Scholar 

  3. Bertrand Van Ouytsel, C.H., Dam, K.H.T., Legay, A.: Analysis of machine learning approaches to packing detection. Comput. Secur. 136, 103536 (2023)

    Google Scholar 

  4. Biondi, F., Enescu, M.A., Given-Wilson, T., Legay, A., Noureddine, L., Verma, V.: Effective, efficient, and robust packing detection and classification. Comput. Secur. 85, 436–451 (2019)

    Article  Google Scholar 

  5. Carlini, N., et al.: On evaluating adversarial robustness (2019)

    Google Scholar 

  6. Choi, M.J., Bang, J., Kim, J., Kim, H., Moon, Y.S., Díaz-Verdejo, J.: All-in-one framework for detection, unpacking, and verification for malware analysis. Secur. Commun. Netw. (2019)

    Google Scholar 

  7. Choi, Y.S., Kim, I.K., Oh, J.T., Ryou, J.C.: PE file header analysis-based packed PE file detection technique (PHAD). In: International Symposium on Computer Science and its Applications (2008)

    Google Scholar 

  8. Demetrio, L., Biggio, B., Roli, F.: Practical attacks on machine learning: a case study on adversarial windows malware. IEEE Secur. Priv. 20, 77–85 (2022)

    Article  Google Scholar 

  9. D’Hondt, A., Bertrand Van Ouytsel, C.H., Legay, A.: Experimental toolkit for manipulating executable packing. In: International Conference on Risks and Security of Internet and Systems (2023)

    Google Scholar 

  10. Fang, Z., Wang, J., Li, B., Wu, S., Zhou, Y., Huang, H.: Evading anti-malware engines with deep reinforcement learning. IEEE (2019)

    Google Scholar 

  11. Han, S., Lee, K., Lee, S.: Packed PE file detection for malware forensics. In: International Conference on Computational Science and Its Applications (2009)

    Google Scholar 

  12. Kancherla, K., Donahue, J., Mukkamala, S.: Packer identification using Byte plot and Markov plot. J. Comput. Virol. Hacking Tech. 12, 101–111 (2015)

    Article  Google Scholar 

  13. Khan, M., Akram, M., Riaz, N.: A comparative analysis of software protection schemes. Int. Arab J. Inf. Technol. (2014)

    Google Scholar 

  14. Ling, X., et al.: Adversarial attacks against windows PE malware detection: a survey of the state-of-the-art. Comput. Secur. 128, 103134 (2021)

    Article  Google Scholar 

  15. Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Secur. Priv. 5, 40–45 (2007)

    Article  Google Scholar 

  16. Pareek, H., Arora, R., Singh, A.: A heuristics-based static analysis approach for detecting packed PE binaries. Int. J. Secur. Appl. 7, 257–268 (2013)

    Google Scholar 

  17. Shin, D., Im, C., Jeong, H., Kim, j., Won, D.: The new signature generation method based on an unpacking algorithm and procedure for a packer detection. In: International Journal of Advanced Science and Technology (2011)

    Google Scholar 

  18. Ugarte-Pedrero, X., Balzarotti, D., Santos, I., Bringas, P.G.: SoK: deep packer inspection: a longitudinal study of the complexity of run-time packers. In: IEEE Symposium on Security and Privacy (2015)

    Google Scholar 

  19. Wu, C., Shi, J., Yang, Y., Li, W.: Enhancing machine learning based malware detection model by reinforcement learning. In: International Conference on Communication and Network Security (2018)

    Google Scholar 

Download references

Acknowledgements

The authors are funded by the CyberExcellence project (RW, Convention 2110186). They want to express their gratitude to Romain Jennes who made a significant contribution through his master’s thesis.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Alexandre D’Hondt , Charles Henry Bertrand Van Ouytsel or Axel Legay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

D’Hondt, A., Bertrand Van Ouytsel, C.H., Legay, A. (2024). Extended Abstract: Evading Packing Detection: Breaking Heuristic-Based Static Detectors. In: Maggi, F., Egele, M., Payer, M., Carminati, M. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2024. Lecture Notes in Computer Science, vol 14828. Springer, Cham. https://doi.org/10.1007/978-3-031-64171-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-64171-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-64170-1

  • Online ISBN: 978-3-031-64171-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics