A heuristics-based static analysis approach for detecting packed PE binaries

12Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

Abstract

Malware authors evade the signature based detection by packing the original malware using custom packers. In this paper, we present a static heuristics based approach for the detection of packed executables. We present 1) the PE heuristics considered for analysis and taxonomy of heuristics; 2) a method for computing the score using power distance based on weights and risks assigned to the defined heuristics; and 3) classification of packed executable based on the threshold obtained with the training data set, and the results achieved with the test data set. The experimental results show that our approach has a high detection rate of 99.82% with a low false positive rate of 2.22%. We also bring out difficulties in detecting packed DLL, CLR and Debug mode executables via header analysis. © 2013 SERSC.

Cite

CITATION STYLE

APA

Arora, R., Singh, A., Pareek, H., & Edara, U. R. (2013). A heuristics-based static analysis approach for detecting packed PE binaries. International Journal of Security and Its Applications, 7(5), 257–268. https://doi.org/10.14257/ijsia.2013.7.5.24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free