Abstract
Malware authors evade the signature based detection by packing the original malware using custom packers. In this paper, we present a static heuristics based approach for the detection of packed executables. We present 1) the PE heuristics considered for analysis and taxonomy of heuristics; 2) a method for computing the score using power distance based on weights and risks assigned to the defined heuristics; and 3) classification of packed executable based on the threshold obtained with the training data set, and the results achieved with the test data set. The experimental results show that our approach has a high detection rate of 99.82% with a low false positive rate of 2.22%. We also bring out difficulties in detecting packed DLL, CLR and Debug mode executables via header analysis. © 2013 SERSC.
Author supplied keywords
Cite
CITATION STYLE
Arora, R., Singh, A., Pareek, H., & Edara, U. R. (2013). A heuristics-based static analysis approach for detecting packed PE binaries. International Journal of Security and Its Applications, 7(5), 257–268. https://doi.org/10.14257/ijsia.2013.7.5.24
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.