A consistently-executing graph-based approach for malware packer identification

11Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

Abstract

Packing is the most common malware obfuscation technique employed to evade detection by anti-virus systems. With the explosive growth of packed malware, packer identification has become increasingly important in current cybersecurity. Most prior studies lack resilience since they neglect the significance of preserving the semantic integrity for pursuing efficiency. Therefore, in this paper, we propose a novel approach based on consistently executing graph (CEG) mining, which can maximize semantics and facilitate the execution intents of executables for identification. We elaborate on the concepts of consistent execution and represent malware packers as structured CEGs. Then, we employ the bipartite matching algorithm built on a designed block proximity metric to extract the critical matching subgraphs. Weisfeiler-Lehman shortest path graph kernel is adopted for pairwise comparison to make the prediction. We have evaluated the efficacy extensively with several experiments on large-scale datasets containing manually packed benign apps, wild-packed malware, and wild-unpacked malware. The promising results demonstrate that our approach is valid and practical when applied to real-world packed malware analysis.

References Powered by Scopus

Shortest-path kernels on graphs

834Citations
N/AReaders
Get full text

A survey on automated dynamic malware-analysis techniques and tools

649Citations
N/AReaders
Get full text

Graph-based malware detection using dynamic analysis

246Citations
N/AReaders
Get full text

Cited by Powered by Scopus

A Survey on Cross-Architectural IoT Malware Threat Hunting

40Citations
N/AReaders
Get full text

Generation & evaluation of adversarial examples for malware obfuscation

40Citations
N/AReaders
Get full text

A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features

27Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Li, X., Shan, Z., Liu, F., Chen, Y., & Hou, Y. (2019). A consistently-executing graph-based approach for malware packer identification. IEEE Access, 7, 51620–51629. https://doi.org/10.1109/ACCESS.2019.2910268

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 12

92%

Lecturer / Post doc 1

8%

Readers' Discipline

Tooltip

Computer Science 10

67%

Nursing and Health Professions 2

13%

Engineering 2

13%

Social Sciences 1

7%

Save time finding and organizing research with Mendeley

Sign up for free