Countering entropy measure attacks on packed software detection

31Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malware writers usually employ several techniques to evade detection. For the last years, the number of variants detected each day has increased significantly. Traditional approaches such as signature scanning, one of the most common techniques employed by anti-virus companies, are becoming inefficient for the high amount of samples found in the wild. In order to bypass this kind of filters, malware writers usually obfuscate and transform the code of their creations. One of the methods employed is executable packing, which consists in compressing or ciphering the real malicious code, and injecting a decryption routine into the executable that will load and decompress it at run-time. Entropy is a common heuristic for the detection of packed executables. High entropy values indicate a random distribution of the bytes that compose the executable, a property very common in compressed and ciphered data. Unfortunately, this entropy measure can be altered by different techniques that modify randomness. In this paper, we detail various attacks found on real Zeus family samples, one of the most powerful and spread malware families at this moment, which are protected by custom made packers. In addition, we describe a method for obtaining an alternative entropy measure more resilient to these techniques, and evaluate it for the classification of packed/not-packed executables, obtaining satisfactory detection and false positive rates. © 2012 IEEE.

Cite

CITATION STYLE

APA

Ugarte-Pedrero, X., Santos, I., Sanz, B., Laorden, C., & Bringas, P. G. (2012). Countering entropy measure attacks on packed software detection. In 2012 IEEE Consumer Communications and Networking Conference, CCNC’2012 (pp. 164–168). https://doi.org/10.1109/CCNC.2012.6181079

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free