skip to main content
survey

File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements

Authors Info & Claims
Published:03 December 2022Publication History
Skip Abstract Section

Abstract

With the growing sophistication of malware, the need to devise improved malware detection schemes is crucial. The packing of executable files, which is one of the most common techniques for code protection, has been repurposed for code obfuscation by malware authors as a means of evading malware detectors (mainly static analysis-based detectors). This paper provides statistics on the use of packers based on an extensive analysis of 24,000 PE files (both malicious and benign files) for the past 10 years, which allowed us to observe trends in packing use during that time and showed that packing is still widely used in malware. This paper then surveys 23 methods proposed in academic research for the detection and classification of packed portable executable (PE) files and highlights various trends in malware packing. The paper highlights the differences between the methods and their abilities to detect and identify various aspects of packing. A taxonomy is presented, classifying the methods as static, dynamic, and hybrid analysis-based methods. The paper also sheds light on the increasing role of machine learning methods in the development of modern packing detection methods. We analyzed and mapped the different packing methods and identified which of them can be countered by the detection methods surveyed in this paper.

REFERENCES

  1. [1] Bat-Erdene M., Kim T., Li H., and Lee H.. 2013. Dynamic classification of packing algorithms for inspecting executables using entropy analysis. Proc. 2013 8th Int. Conf. Malicious Unwanted Softw. The Am. MALWARE 2013. 1926.Google ScholarGoogle Scholar
  2. [2] Al-Zanei M. M. K.. 2014. Generic packing detection using several complexity analysis for accurate malware detection 5, 1 (2014), 714.Google ScholarGoogle Scholar
  3. [3] Sun L., Versteeg S., Boztaş S., and Yann T.. 2010. Pattern Recognition Techniques for the Classification of Malware Packers. Springer, Berlin, 2010, 370390.Google ScholarGoogle Scholar
  4. [4] Morgenstern D.-I. M. and Pilz H.. Useful and useless statistics about viruses and anti-virus programs.Google ScholarGoogle Scholar
  5. [5] Ferrie Peter, Senior Anti-virus Researcher, and Microsoft Corporation. 2008. Anti-unpacker tricks. Current (2008).Google ScholarGoogle Scholar
  6. [6] Bat-Erdene M., Kim T., Park H., and Lee H.. 2017. Packer detection for multi-layer executables using entropy analysis. Entropy 19, 3 (2017), 118.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Yan W., Zhang Z., and Ansari N.. 2008. Revealing packed malware. IEEE Secur. Priv. Mag. 6, 5 (2008), 6569.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Kim M.-J. et al. 2010. Design and performance evaluation of binary code packing for protecting embedded software against reverse engineering. In 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing 2010, 8086.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Choi Y., Kim I., Oh J., and Ryou J.. 2008. PE file header analysis-based packed PE file detection technique (PHAD). In International Symposium on Computer Science and its Applications 2008. 2831.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Perdisci R., Lanzi A., and Lee W.. 2008. Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29, 14 (2008), 19411946.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] PE Format | Microsoft Docs. [Online]. Available: https://docs.microsoft.com/en-us/windows/desktop/debug/pe-format. [Accessed: 04-Feb-2021].Google ScholarGoogle Scholar
  12. [12] Devi D. and Nandi S.. 2012. PE file features in detection of packed executables. Entropy 4, 3 (2012), 476478.Google ScholarGoogle Scholar
  13. [13] Sikorski M. and Honig A.. 2012. Practical malware analysis: The hands-on guide to dissecting malicious software. No Starch Press.Google ScholarGoogle Scholar
  14. [14] Sun L., Versteeg S., Boztaş S., and Yann T.. 2010, July. Pattern recognition techniques for the classification of malware packers. In Australasian Conference on Information Security and Privacy. Springer, Berlin, Heidelberg, 370–390.Google ScholarGoogle Scholar
  15. [15] Abhi Gupta D. M. and Arya Akshi S.. 2018. Hashing Base Ed Encryption N And Anti-Deb Bugger Suppor Rt For Packing Multiple Fi Es Into Sing E Executable (2018), 9699.Google ScholarGoogle Scholar
  16. [16] “I Executable and Linkable Format (ELF).”Google ScholarGoogle Scholar
  17. [17] Muhammad K. and Zahid H.. 2015. ITEE Journal. ITEE J. 4, 4 (2015), 15.Google ScholarGoogle Scholar
  18. [18] Hassnain M. and Abbas A.. 2017. ITEE Journal. Int. J. Inf. Technol. Electr. Eng. 6, 1 (2017), 1016.Google ScholarGoogle Scholar
  19. [19] Bat-Erdene M., Park H., Li H., Lee H., and Choi M.-S.. 2017. Entropy analysis to classify unknown packing algorithms for malware detection. Int. J. Inf. Secur. 16, 3 (2017), 227248.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Li B., Zhang Y., Li J., Yang W., and Gu D.. 2018. AppSpear: Automating the hidden-code extraction and reassembling of packed Android malware. J. Syst. Softw. 140 (2018), 316.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Lyda R. and Hamrock J.. 2007. Using entropy analysis to find encrypted and packed malware. IEEE Secur. Priv. Mag. 5, 2 (2007), 4045.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Jacob G., Comparetti P. M., Neugschwandtner M., Kruegel C., and Vigna G.. 2013. A static, packer-agnostic filter to detect similar malware samples. In Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer-Verlag, 2013, 102122.Google ScholarGoogle Scholar
  23. [23] Zhang J., Zhang K., Qin Z., Yin H., and Wu Q.. 2018. Sensitive system calls based packed malware variants detection using principal component initialized multilayers neural networks. 113.Google ScholarGoogle Scholar
  24. [24] Entropy and the distinctive signs of packed PE files. | NTinfo. [Online]. Available: http://n10info.blogspot.com/2014/06/entropy-and-distinctive-signs-of-packed.html. [Accessed: 04-Feb-2021].Google ScholarGoogle Scholar
  25. [25] Good I. J., Gover T. N., and Mitchell G. J.. 1970. Exact distributions for X 2 and for the likelihood-ratio statistic for the equiprobable multinomial distribution. 1970.Google ScholarGoogle Scholar
  26. [26] Cheng B. et al. 2018. Towards paving the way for large-scale windows malware analysis. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS ’18. 395411.Google ScholarGoogle Scholar
  27. [27] Ugarte-Pedrero X., Balzarotti D., Santos I., and Bringas P. G.. 2015. SoK: Deep packer inspection: A longitudinal study of the complexity of run-time packers. In 2015 IEEE Symposium on Security and Privacy. 659673.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Bonfante G. et al. 2015. CoDisasm: Medium scale concatic disassembly of self-modifying binaries with overlapping instructions. 2015.Google ScholarGoogle Scholar
  29. [29] Bueno D., Compton K. J., Sakallah K. A., and Bailey M.. Detecting traditional packers, decisively.Google ScholarGoogle Scholar
  30. [30] Cesare S., Xiang Y., and Zhou W.. 2013. Malwise—an effective and efficient classification system for packed and polymorphic malware. IEEE Trans. Comput. 62, 6 (2013), 11931206.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Li Ang, Zhang Yue, Zhang Junxing, and Zhu Gang. 2015. A token strengthened encryption packer to prevent reverse engineering PE files. In 2015 International Conference on Estimation, Detection and Information Fusion (ICEDIF'15). 307312.Google ScholarGoogle Scholar
  32. [32] Bilge L., Lanzi A., and Balzarotti D.. Thwarting real-time dynamic unpacking.Google ScholarGoogle Scholar
  33. [33] Křoustek J., Matula P., Kolář D., and Zavoral M.. Advanced preprocessing of binary executable files and its usage in retargetable decompilation.Google ScholarGoogle Scholar
  34. [34] Durfina L., Kroustek J., and Zemek P.. 2013. PsybOt malware: A step-by-step decompilation case study. In 2013 20th Working Conference on Reverse Engineering (WCRE'13). 449456.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Levine J. R.. 2000. Linkers and Loaders. Morgan Kaufmann.Google ScholarGoogle Scholar
  36. [36] Cozzi E., Graziano M., Fratantonio Y., and Balzarotti D.. 2018. Understanding Linux malware. Proc. - IEEE Symp. Secur. Priv. 2018-May, 161175.Google ScholarGoogle Scholar
  37. [37] Roundy K. A. and Miller B. P.. 2013. Binary-code obfuscations in prevalent packer tools. ACM Comput. Surv. 46, 1 (2013), 132.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] UPX: the Ultimate Packer for eXecutables - Homepage. [Online]. Available: https://upx.github.io/. [Accessed: 10-Feb-2021].Google ScholarGoogle Scholar
  39. [39] Menéndez H. D., Bhattacharya S., Clark D., and Barr E. T.. 2019. The arms race: Adversarial search defeats entropy used to detect malware. Expert Syst. Appl. 118 (2019), 246260.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Manual Unpacking of UPX Packed Binary File - www.SecurityXploded.com. [Online]. Available: https://securityxploded.com/unpackingupx.php. [Accessed: 10-Feb-2021].Google ScholarGoogle Scholar
  41. [41] Unpacking, Reversing, Patching. [Online]. Available: https://resources.infosecinstitute.com/unpacking-reversing-patching/#gref. [Accessed: 11-Feb-2021].Google ScholarGoogle Scholar
  42. [42] Oreans Technology: Software Security Defined. [Online]. Available: https://www.oreans.com/themida.php. [Accessed: 11-Feb-2021].Google ScholarGoogle Scholar
  43. [43] Coogan K., Debray S., Kaochar T., and Townsend G.. 2009. Automatic static unpacking of malware binaries. In 2009 16th Working Conference on Reverse Engineering 2009, 167176.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Osaghae E. O.. 2016. Classifying packed programs as malicious software detected 2016.Google ScholarGoogle Scholar
  45. [45] Bohne L.. 2009. Pandora's Bochs: Automatic Unpacking of Malware 121, 2009.Google ScholarGoogle Scholar
  46. [46] Guo F., Ferrie P., and Chiueh T.. 2008. A study of the packer problem and its solutions. In Recent Advances in Intrusion Detection. Berlin, Springer, Berlin, 2008, 98115.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Yu S.-C. and Li Y.-C.. 2009. A unpacking and reconstruction system-AGUnpacker. In 2009 International Symposium on Computer Network and Multimedia Technology. 14.Google ScholarGoogle Scholar
  48. [48] Gagnon M. N., Taylor S., and Ghosh A. K.. 2007. Software protection through anti-debugging. IEEE Secur. Priv. Mag. 5, 3 (2007), 8284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Ferrie P., Researcher S. A., and Corporation M.. 2008. Anti-unpacker tricks. Current. 125.Google ScholarGoogle Scholar
  50. [50] Liţă C. V., Cosovan D., and Gavriluţ D.. 2018. Anti-emulation trends in modern packers: A survey on the evolution of anti-emulation techniques in UPA packers. J. Comput. Virol. Hacking Tech. 14, 2 (2018), 107126.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Carrera E. and Erdélyi G.. 2004. Digital genome mapping. 2004.Google ScholarGoogle Scholar
  52. [52] Hu X., Chiueh T.-C., and Shin K. G.. 2009. Large-Scale Malware Indexing Using Function-Call Graphs * †. 2009.Google ScholarGoogle Scholar
  53. [53] Karnik A., Goswami S., and Guha R.. 2007. Detecting obfuscated viruses using cosine similarity analysis. In First Asia International Conference on Modelling & Simulation (AMS’07). 165170.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Walenstein A., Venable M., Hayes M., Thompson C., and Lakhotia A.. Exploiting similarity between variants to defeat malware “Vilo” method for comparing and searching binary programs.Google ScholarGoogle Scholar
  55. [55] Fleshman W., Raff E., Zak R., Mclean M., and Nicholas C.. Static malware detection & subterfuge: Quantifying the robustness of machine learning and current anti-virus.Google ScholarGoogle Scholar
  56. [56] Abou-Assaleh T., Cercone N., Keselj V., and Sweidan R.. 2004. N-gram-based detection of new malicious code. Proc. 28th Annu. Int. Comput. Softw. Appl. Conf. 2004. COMPSAC 2004 2 (2004), 4142.Google ScholarGoogle Scholar
  57. [57] Wicherski G.. 2009. peHash: A novel approach to fast malware clustering. 2nd USENIX Work. Large-Scale Exploit. Emergent Threat. 2009.Google ScholarGoogle Scholar
  58. [58] Chum O., Philbin J., and Zisserman A.. 2008. Near duplicate image detection: Min-Hash and tf-idf weighting. In Proceedings of the British Machine Vision Conference 2008, 50, 1–50.10.Google ScholarGoogle ScholarCross RefCross Ref
  59. [59] Jin W. et al. 2012. Binary function clustering using semantic hashes. In Proceedings - 2012 11th International Conference on Machine Learning and Applications, ICMLA'2012, 1, 386391.Google ScholarGoogle Scholar
  60. [60] Crussell J., Gibler C., and Chen H.. 2013. Scalable semantics-based detection of similar Android applications. In Esorics 2013, 182199.Google ScholarGoogle Scholar
  61. [61] Akusok A., Miche Y., Hegedus J., Nian R., and Lendasse A.. 2014. A two-stage methodology using K-NN and false-positive minimizing ELM for nominal data classification. Cognit. Comput. 6, 3 (2014), 432445.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] Tamersoy A., Roundy K., and Chau D. H.. 2014. Guilt by association. Proc. 20th ACM SIGKDD Int. Conf. Knowl. Discov. Data Min. - KDD’14. 15241533.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. [63] Oprisa C., Checiches M., and Nandrean A.. 2014. Locality-sensitive hashing optimizations for fast malware clustering. In Proceedings - 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing, ICCP'2014. 97104.Google ScholarGoogle Scholar
  64. [64] Statistical Mechanics – R. K. Pathria, Paul D. Beale - Google ספרים.” [Online]. Available: https://books.google.co.il/books?id=KdbJJAXQ-RsC&printsec=frontcover&redir_esc=y&hl=iw#v=onepage&q&f=false. [Accessed: 11-Feb-2021].Google ScholarGoogle Scholar
  65. [65] Santos I., Ugarte-Pedrero X., Sanz B., Laorden C., and Bringas P. G.. 2011. Collective classification for packed executable identification. In Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference on - CEAS’11. 2330.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. [66] Kolbitsch C., Comparetti P. M., Kruegel C., Kirda E., Zhou X., and Wang X.. Effective and efficient malware detection at the end host.Google ScholarGoogle Scholar
  67. [67] Tzermias Z., Sykiotakis G., Polychronakis M., and Markatos E. P.. 2011. Combining Static and Dynamic Analysis for the Detection of Malicious Documents. 2011.Google ScholarGoogle Scholar
  68. [68] Maiorca D., Corona I., and Giacinto G.. 2013. Looking at the Bag is not Enough to Find the Bomb: An Evasion of Structural Methods for Malicious PDF Files Detection. 2013.Google ScholarGoogle Scholar
  69. [69] Schmitt F., Gassen J., and Gerhards-Padilla E.. 2012. PDF scrutinizer: Detecting Javascript-based attacks in PDF documents. In 2012 Tenth Annual International Conference on Privacy, Security and Trust. 104111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. [70] Lu X., Zhuge J., Wang R., Cao Y., and Chen Y.. 2013. De-obfuscation and detection of malicious PDF files with high accuracy. In 2013 46th Hawaii International Conference on System Sciences. 48904899.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. [71] Royal P., Halpin M., Dagon D., Edmonds R., and Lee W.. 2006. PolyUnpack: Automating the hidden-code extraction of unpack-executing malware. In 2006 22nd Annual Computer Security Applications Conference (ACSAC’06). 289300.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Cohen A. and Nissim N.. 2018. Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory. Expert Syst. Appl. 102, 158178.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. [73] Nissim N., Lapidot Y., Cohen A., and Elovici Y.. 2018. Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining. Knowledge-Based Syst. 153, (2018), 147175.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. [74] Nissim N., Moskovitch R., Rokach L., and Elovici Y.. 2014. Novel active learning methods for enhanced PC malware detection in Windows OS. Expert Syst. Appl. 41, 13 (2014), 58435857.Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Nissim N., Moskovitch R., Rokach L., and Elovici Y.. 2012. Detecting unknown computer worm activity via support vector machines and active learning. Pattern Anal. Appl. 15, 4 (2012), 459475.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Cohen A., Nissim N., Rokach L., and Elovici Y.. 2016. SFEM: Structural feature extraction methodology for the detection of malicious office documents using machine learning methods. Expert Syst. Appl. 63 (2016), 324343.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. [77] Nissim N., Cohen A., Glezer C., and Elovici Y.. 2015. Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. Comput. Secur. 48 (2015), 246266.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. [78] Nissim N., Cohen A., and Elovici Y.. 2017. ALDOCX: Detection of unknown malicious microsoft office documents using designated active learning methods based on new structural feature extraction methodology. IEEE Trans. Inf. Forensics Secur. 12, 3 (2017), 631646.Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. [79] Nissim N. et al. 2016. Keeping pace with the creation of new malicious PDF files using an active-learning based detection framework. Secur. Inform. 5, 1 (2016) 1.Google ScholarGoogle ScholarCross RefCross Ref
  80. [80] Nissim N., Cohen A., and Elovici Y.. 2016. Boosting the detection of malicious documents using designated active learning methods. Proc. - 2015 IEEE 14th Int. Conf. Mach. Learn. Appl. ICMLA 2015. 760765.Google ScholarGoogle Scholar
  81. [81] Cohen A., Nissim N., and Elovici Y.. 2018. Novel set of general descriptive features for enhanced detection of malicious emails using machine learning methods. Expert Syst. Appl. 110 (2018), 143169.Google ScholarGoogle ScholarCross RefCross Ref
  82. [82] Ebringer T., Sun L., and Boztas S.. 2008. A fast randomness test that preserves local detail. Virus Bull. (2008), 3442.Google ScholarGoogle Scholar
  83. [83] “PE iDentifier (PEiD) 0.95 /Binary Analysis/Editing/Downloads - Tuts 4 You.” [Online]. Available: https://tuts4you.com/e107_plugins/download/download.php?view.398. [Accessed: 11-Feb-2021].Google ScholarGoogle Scholar
  84. [84] Kang M. G., Poosankam P., and Yin H.. 2007. Renovo. In Proceedings of the 2007 ACM Workshop on Recurring Malcode - WORM’07. 46.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. [85] “Exeinfo PE 0.0.5.1 - Download.” [Online]. Available: https://exeinfo-pe.en.uptodown.com/windows. [Accessed: 11-Feb-2021].Google ScholarGoogle Scholar
  86. [86] “Exeinfo PE by A.S.L - packer - compression detector and data detector.” [Online]. Available: http://exeinfo.atwebpages.com/. [Accessed: 11-Feb-2021].Google ScholarGoogle Scholar
  87. [87] Google Code Archive - Long-term storage for Google Code Project Hosting. [Online]. Available: https://code.google.com/archive/p/fuu/. [Accessed: 21-Feb-2021].Google ScholarGoogle Scholar
  88. [88] Sheetrit E., Nissim N., Klimov D., and Shahar Y.. 1983. Temporal probabilistic profiles for sepsis prediction in the ICU. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining - KDD’19. 29612969.Google ScholarGoogle Scholar
  89. [89] Allen J. F.. 1983. Maintaining knowledge about temporal intervals. 1983.Google ScholarGoogle Scholar
  90. [90] Song F. and Croft W. B.. 1999. A general language model for information retrieval. In Proceedings of the Eighth International Conference on Information and Knowledge Management. 316321.Google ScholarGoogle Scholar
  91. [91] Kullback S. and Leibler R. A.. 1951. On information and sufficiency. Ann. Math. Stat. 22, 1 (1951), 7986.Google ScholarGoogle ScholarCross RefCross Ref
  92. [92] Which are the Linux Executable Files, and How do We Create Them? [Online]. Available: https://www.webhostinghero.com/blog/which-are-the-linux-executable-files-and-how-do-we-create-them/. [Accessed: 11-Feb-2021].Google ScholarGoogle Scholar
  93. [93] Kancherla Kesav, Donahue John, and Mukkamala Srinivas. 2016. Packer identification using byte plot and Markov plot. J. Comput. Virol. Hacking Tech. (2016). DOI: DOI: https://doi.org/10.1007/s11416-015-0249-8Google ScholarGoogle ScholarCross RefCross Ref
  94. [94] Kim Yeongcheol, Paik Joon Young, Choi Seokwoo, and Cho Eun Sun. 2019. Efficient SVM based packer identification with binary diffing measures. In Proceedings - International Computer Software and Applications Conference. DOI: DOI: https://doi.org/10.1109/COMPSAC.2019.00117Google ScholarGoogle Scholar
  95. [95] Jung Byeong Ho, Bae Seong Il, Choi Chang, and Im Eul Gyu. 2020. Packer identification method based on byte sequences. In Concurrency Computation. DOI: DOI: https://doi.org/10.1002/cpe.5082Google ScholarGoogle ScholarCross RefCross Ref
  96. [96] Bergenholtz Erik, Casalicchio Emiliano, Ilie Dragos, and Moss Andrew. 2020. Detection of metamorphic malware packers using multilayered LSTM networks. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). DOI: DOI: https://doi.org/10.1007/978-3-030-61078-4_3Google ScholarGoogle Scholar
  97. [97] Saleh Moustafa, Ratazzi E. Paul, and Xu Shouhuai. 2017. A control flow graph-based signature for packer identification. In Proceedings - IEEE Military Communications Conference MILCOM. DOI: DOI: https://doi.org/10.1109/MILCOM.2017.8170793Google ScholarGoogle Scholar
  98. [98] Gibert Daniel, Mateu Carles, Planes Jordi, and Vicens Ramon. 2019. Using convolutional neural networks for classification of malware represented as images. J. Comput. Virol. Hacking Tech. (2019). DOI: DOI: https://doi.org/10.1007/s11416-018-0323-0Google ScholarGoogle ScholarCross RefCross Ref
  99. [99] Biondi Fabrizio, Enescu Michael A., Given-Wilson Thomas, Legay Axel, Noureddine Lamine, and Verma Vivek. 2019. Effective, efficient, and robust packing detection and classification. Comput. Secur. (2019). DOI: DOI: https://doi.org/10.1016/j.cose.2019.05.007Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. [100] Cheng Binlin and Li Pengwei. 2018. BareunPack: Generic unpacking on the bare-metal operating system. IEICE Trans. Inf. Syst. (2018). DOI: DOI: https://doi.org/10.1587/transinf.2017EDP7424Google ScholarGoogle ScholarCross RefCross Ref
  101. [101] Zhang Zhigang, Chang Chaowen, Han Peisheng, and Zhang Hongtao. 2020. Packed malware variants detection using deep belief networks. MATEC Web Conf. (2020). DOI: DOI: https://doi.org/10.1051/matecconf/202030902002Google ScholarGoogle Scholar
  102. [102] Hua Yakang, Du Yuanzheng, and He Dongzhi. 2020. Classifying packed malware represented as control flow graphs using deep graph convolutional neural network. In Proceedings - 2020 International Conference on Computer Engineering and Application ICCEA'2020. DOI: DOI: https://doi.org/10.1109/ICCEA50009.2020.00062Google ScholarGoogle Scholar
  103. [103] Yakura Hiromu, Shinozaki Shinnosuke, Nishimura Reon, Oyama Yoshihiro, and Sakuma Jun. 2018. Malware analysis of imaged binary samples by convolutional neural network with attention mechanism. In CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. DOI: DOI: https://doi.org/10.1145/3176258.3176335Google ScholarGoogle Scholar
  104. [104] Vaswani Ashish, Shazeer Noam, Parmar Niki, Uszkoreit Jakob, Jones Llion, Gomez Aidan N., Kaiser Łukasz, and Polosukhin Illia. 2017. Attention is all you need. In Advances in Neural Information Processing Systems.Google ScholarGoogle Scholar
  105. [105] Obfuscated Files or Information: Software Packing | MITRE. Retrieved February 21, 2021 from https://attack.mitre.org/techniques/T1027/002/.Google ScholarGoogle Scholar
  106. [106] The WildList Organization International. Retrieved February 25, 2021 from http://www.wildlist.org/.Google ScholarGoogle Scholar
  107. [107] Five ways Android malware is becoming more resilient | Broadcom. Retrieved February 21, 2021 from https://www.symantec.com/connect/blogs/five-ways-android-malware-becoming-more-resilient.Google ScholarGoogle Scholar
  108. [108] Executable compression - Wikipedia. Retrieved February 21, 2021 from https://en.wikipedia.org/wiki/Executable_compression.Google ScholarGoogle Scholar
  109. [109] ImpREC - aldeid. Retrieved February 25, 2021 from https://www.aldeid.com/wiki/ImpREC.Google ScholarGoogle Scholar
  110. [110] LordPE - aldeid. Retrieved February 25, 2021 from https://www.aldeid.com/wiki/LordPE.Google ScholarGoogle Scholar
  111. [111] Cuckoo Sandbox - Automated Malware Analysis. Retrieved February 21, 2021 from https://cuckoosandbox.org/.Google ScholarGoogle Scholar
  112. [112] The Sandbox | Understanding CyberForensics. Retrieved February 25, 2021 from https://cwsandbox.org/.Google ScholarGoogle Scholar
  113. [113] Automated Malware Analysis Tool | Falcon Sandbox | CrowdStrike. Retrieved February 21, 2021 from https://www.crowdstrike.com/endpoint-security-products/falcon-sandbox-malware-analysis/.Google ScholarGoogle Scholar
  114. [114] Free Automated Malware Analysis Service - powered by Falcon Sandbox. Retrieved February 21, 2021 from https://www.hybrid-analysis.com/.Google ScholarGoogle Scholar
  115. [115] unicorn/sample_arm.c at master · unicorn-engine/unicorn. Retrieved February 21, 2021 from https://github.com/unicorn-engine/unicorn/blob/master/samples/sample_arm.c.Google ScholarGoogle Scholar
  116. [116] Aghakhani Hojjat, Gritti Fabio, Mecca Francesco, Lindorfer Martina, Ortolani Stefano, Balzarotti Davide, Vigna Giovanni, and Kruegel Christopher. 2020. When malware is packin’ heat; Limits of machine learning classifiers based on static analysis features. DOI: DOI: https://doi.org/10.14722/ndss.2020.24310Google ScholarGoogle Scholar
  117. [117] Yan W., Zhang Z., and Ansari N.. 2008. Revealing packed malware. In IEEE Security & Privacy 6, 5 (2008), 6569, DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. [118] Lelewer Debra A. and Hirschberg Daniel S.. 1987. Data compression. ACM Comput. Surv. 19, 3 (1987), 261296. DOI: DOI: https://doi.org/10.1145/45072.45074Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. [119] Huffman David A.. 1952. A method for the construction of minimum-redundancy codes. Proceedings of the IRE 40, 9 (1952), 10981101.Google ScholarGoogle ScholarCross RefCross Ref
  120. [120] Threat Actors Use Delphi Packer to Shield Binaries From Malware Classification. Retrieved November 11, 2021 from https://securityintelligence.com/news/threat-actors-use-delphi-packer-to-shield-binaries-from-malware-classification/.Google ScholarGoogle Scholar
  121. [121] Nissim Nir et al. 2019. Sec-lib: Protecting scholarly digital libraries from infected papers using active machine learning framework. IEEE Access 7 (2019), 110050110073.Google ScholarGoogle ScholarCross RefCross Ref
  122. [122] Cohen Aviad, Nissim Nir, and Elovici Yuval. 2020. MalJPEG: Machine learning based solution for the detection of malicious JPEG images. IEEE Access 8 (2020), 1999720011.Google ScholarGoogle ScholarCross RefCross Ref
  123. [123] Nissim Nir et al. 2014. ALPD: Active learning framework for enhancing the detection of malicious pdf files. 2014 IEEE Joint Intelligence and Security Informatics Conference. IEEE, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. [124] Rudd E. M., Harang R., and Saxe J.. 2018. MEADE: Towards a malicious email attachment detection engine. 2018 IEEE Int. Symp. Technol. Homel. Secur. HST'2018. 17. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  125. [125] Shukla S., Kolhe G., Pd S. M., and Rafatirad S.. 2019. RNN-Based classifier to detect stealthy malware using localized features and complex symbolic sequence. Proc. - 18th IEEE Int. Conf. Mach. Learn. Appl. ICMLA'2019. 406409. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  126. [126] Li M., Liu Y., Yu M., Li G., Wang Y., and Liu C.. 2017. FEPDF: A robust feature extractor for malicious PDF detection. 2017 IEEE Trustcom/BigDataSE/ICESS.Google ScholarGoogle ScholarCross RefCross Ref
  127. [127] GitHub - NtQuery/Scylla: Imports Reconstructor. Retrieved March 7, 2022 from https://github.com/NtQuery/Scylla.Google ScholarGoogle Scholar
  128. [128] Mantovani Alessandro, Aonzo Simone, Ugarte-Pedrero Xabier, Merlo Alessio, and Balzarotti Davide. Prevalence and impact of low-entropy packing schemes in the malware ecosystem. DOI: DOI: https://doi.org/10.14722/ndss.2020.24297Google ScholarGoogle Scholar

Index Terms

  1. File Packing from the Malware Perspective: Techniques, Analysis Approaches, and Directions for Enhancements

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 55, Issue 5
      May 2023
      810 pages
      ISSN:0360-0300
      EISSN:1557-7341
      DOI:10.1145/3567470
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 3 December 2022
      • Online AM: 24 May 2022
      • Accepted: 6 April 2022
      • Revised: 12 March 2022
      • Received: 22 March 2021
      Published in csur Volume 55, Issue 5

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • survey
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format