skip to main content
10.1145/2388576.2388607acmconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

ESCAPE: entropy score analysis of packed executable

Authors Info & Claims
Published:25 October 2012Publication History

ABSTRACT

Malware developers hide the malicious payload of malware binary by employing various obfuscation techniques. One such technique commonly applied is packing. Packer transforms the original bytes so it is difficult to recognize the behaviour of any executable. Although the contents of a file is changed, some byte patterns may be preserved across different packed executables. Malware detectors need to apply unpacking mechanism prior to any detection or analysis to every sample under consideration. In this paper, we have proposed a method that discriminate packed binaries from the native files to minimize the processing time of AV scanners. We have used the blockwise entropy score of byte features of the executable. Experimental results show that the proposed method is capable of identifying packed and native executable which are packed using different malware packers.

References

  1. ASPack. http://www.aspack.com/, Last Accessed October 2011.Google ScholarGoogle Scholar
  2. GUnPacker. http://leechermods.com, Last Accessed November 2011.Google ScholarGoogle Scholar
  3. Objdump a Pe Dumping Tool. http://sourceforge.net/projects/objdump, Last Accessed March 2011.Google ScholarGoogle Scholar
  4. PECompact. http://www.bitsum.com/pecompact.php, Last Accessed October 2011.Google ScholarGoogle Scholar
  5. UPX. http://upx.sourceforge.net/, Last Accessed October 2011.Google ScholarGoogle Scholar
  6. VMUnpacker. http://www.woodman.co, Last Accessed November 2011.Google ScholarGoogle Scholar
  7. S. C. and W. W. The Mathematical Theory of Communication. 1963. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether:Malware Analysis via Hardware Virtualization Extensions. In Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pages 51--62. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Haahr. An Introduction to Randomness and Random Numbers, www.random.org/essay.html, June 1999.Google ScholarGoogle Scholar
  10. R. Hamming. Coding and Information Theory. Prentice-Hall, 2 edition, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. V. Laxmi, M. S. Gaur, P. Faruki, and S. Naval. PEAL - Packed Executable AnaLysis. In ADCONS, pages 237--243, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Lyda and J. Hamrock. Using Entropy Analysis to Find Encrypted and Packed Malware. IEEE Security and Privacy, 5(2):40--45, Mar. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. PEiD. Packed Executable IDentification. http://www.peid.info/., Last Accessed January 2012.Google ScholarGoogle Scholar
  14. R. Perdisci, A. Lanzi, and W. Lee. Mcboost:Boosting Scalability in Malware Collection and Analysis using Statistical Classification of Executables. In Computer Security Applications Conference, 2008. ACSAC 2008. Annual, pages 301--310, dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Z. Shafiq, S. M. Tabish, F. Mirza, and M. Farooq. PE-Probe: Mining Structural Information to Detect Malicious Executables in Realtime. In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection RAID '09., pages 121--141, Saint-Malo, France. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Z. Shafiq, S. M. Tabish, F. Mirza, and M. Farooq. PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. In Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID '09, pages 121--141, Berlin, Heidelberg, 2009. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. B. T. and M. M. Runtime Packers: The Hidden Problem. In Proceedings of Black Hat USA, Black Hat, 2006.Google ScholarGoogle Scholar
  18. X. Ugarte-Pedrero, I. Santos, and P. G. Bringas. Structural feature based anomaly detection for packed executable identification. In Proceedings of the 4th international conference on Computational intelligence in security for information systems, CISIS'11, pages 230--237, Berlin, Heidelberg, 2011. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. VirusTotal. Free Software Downloads and Software Reviews, https://www.virustotal.com/, Last Accessed November 2011.Google ScholarGoogle Scholar
  20. VXHeavens. Virus Collections (VXheavens). http://vl.netlux.org/vl.php/, Last Accessed August 2011.Google ScholarGoogle Scholar

Index Terms

  1. ESCAPE: entropy score analysis of packed executable

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIN '12: Proceedings of the Fifth International Conference on Security of Information and Networks
        October 2012
        226 pages
        ISBN:9781450316682
        DOI:10.1145/2388576

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 October 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate102of289submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader