Misleading malware similarities analysis by automatic data structure obfuscation

11Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Program obfuscation techniques have been widely used by malware to dodge the scanning from anti-virus detectors. However, signature based on the data structures appearing in the runtime memory makes traditional code obfuscation useless. Laika [2] implements this signature using Bayesian unsupervised learning, which clusters similar vectors of bytes in memory into the same class. We present a novel malware obfuscation technique that automatically obfuscate the data structure layout so that memory similarities between malware programs are blurred and hardly recognized. We design and implement the automatic data structure obfuscation technique as a GNU GCC compiler extension that can automatically distinguish the obfuscability of the data structures and convert part of the unobfuscable data structures into obfuscable. After evaluated by fourteen real-world malware programs, we present that our tool maintains a high proportion of obfuscated data structures as 60.19% for type and 60.49% for variable. © 2011 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Xin, Z., Chen, H., Han, H., Mao, B., & Xie, L. (2011). Misleading malware similarities analysis by automatic data structure obfuscation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6531 LNCS, pp. 181–195). Springer Verlag. https://doi.org/10.1007/978-3-642-18178-8_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free