Stealth loader: Trace-free program loading for analysis evasion

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Understanding how application programming interfaces (APIs) are used in a program plays an important role in malware analysis. This, however, has resulted in an endless battle between malware authors and malware analysts around the development of API [de]obfuscation techniques over the last few decades. Our goal in this paper is to show the limit of existing API de-obfuscation techniques. To do that, we first analyzed existing API [de]obfuscation techniques and clarified that an attack vector commonly exists in these techniques; then, we present Stealth Loader, which is a program loader to bypass all existing API de-obfuscation techniques. The core idea of Stealth Loader is to load a dynamic link library (DLL) and resolve its dependency without leaving any traces on memory to be detected. We demonstrated the effectiveness of Stealth Loader by analyzing a set ofWindows executables and malware protected with Stealth Loader using major dynamic and static analysis tools. The results indicate that among other obfuscation tools, only Stealth Loader is able to successfully bypass all analysis tools.

Cite

CITATION STYLE

APA

Kawakoya, Y., Shioji, E., Otsuki, Y., Iwamura, M., & Miyoshi, J. (2018). Stealth loader: Trace-free program loading for analysis evasion. Journal of Information Processing, 26, 673–686. https://doi.org/10.2197/ipsjjip.26.673

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free