Skip to main content
Top
Published in: International Journal of Information Security 2/2024

01-11-2023 | Special Issue Paper

A survey on run-time packers and mitigation techniques

Authors: Ehab Alkhateeb, Ali Ghorbani, Arash Habibi Lashkari

Published in: International Journal of Information Security | Issue 2/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The battle between malware analysts and malware authors is a never-ending challenge with the advent of complex malware such as polymorphic, metamorphic, and packed malware. A malware packer uses various techniques combined with file encryption to harden against reverse engineering of the program and hinder the analysis of program behaviors. In any case, substantial elements have emerged after more than a decade of continuous research in malware packer detection, such as multi-packing. Newly modified packers have this persistent problem, which demands new concepts and techniques. This study aims to provide a systematic and comprehensive review of run-time packers’ mitigation techniques. We provide different types of packers and propose a malware packer handling life cycle for AV engines. Furthermore, we deliver a modern malware packers classification features set by examining the feature engineering in the packing handling life-cycle, such as feature extraction techniques in machine learning approaches. Also, we present extensive related works and discuss each work’s benefits and weaknesses to address this problem, with a particular emphasis on packers identification techniques, to aid in unpacking malware. Finally, we identify the current gaps in knowledge and provide ideas about future work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Aaraj, N., Raghunathan, A., Jha, N.K.: Dynamic binary instrumentation-based framework for malware defense. In: International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, pp. 64–87. Springer, Berlin (2008) Aaraj, N., Raghunathan, A., Jha, N.K.: Dynamic binary instrumentation-based framework for malware defense. In: International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, pp. 64–87. Springer, Berlin (2008)
3.
go back to reference Alkhateeb, E.M., Stamp, M.: A dynamic heuristic method for detecting packed malware using Naive Bayes. In: 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA), pp. 1–6. IEEE (2019) Alkhateeb, E.M., Stamp, M.: A dynamic heuristic method for detecting packed malware using Naive Bayes. In: 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA), pp. 1–6. IEEE (2019)
4.
go back to reference Alkhateeb, E.M.S.: Dynamic malware detection using API similarity. In: 2017 IEEE International Conference on Computer and Information Technology (CIT), pp. 297–301. IEEE (2017) Alkhateeb, E.M.S.: Dynamic malware detection using API similarity. In: 2017 IEEE International Conference on Computer and Information Technology (CIT), pp. 297–301. IEEE (2017)
5.
go back to reference Amer, E., Zelinka, I.: A dynamic windows malware detection and prediction method based on contextual understanding of API call sequence. Comput. Secur. 92, 101760 (2020)CrossRef Amer, E., Zelinka, I.: A dynamic windows malware detection and prediction method based on contextual understanding of API call sequence. Comput. Secur. 92, 101760 (2020)CrossRef
6.
go back to reference Anderson, H.S., Roth, P.: Ember: an open dataset for training static PE malware machine learning models. arXiv preprint arXiv:1804.04637 (2018) Anderson, H.S., Roth, P.: Ember: an open dataset for training static PE malware machine learning models. arXiv preprint arXiv:​1804.​04637 (2018)
7.
go back to reference Bai, J., Shi, Q., Mu, S.: A malware and variant detection method using function call graph isomorphism. Security and Communication Networks (2019) Bai, J., Shi, Q., Mu, S.: A malware and variant detection method using function call graph isomorphism. Security and Communication Networks (2019)
8.
9.
go back to reference Bat-Erdene, M., Park, H., Li, H., Lee, H., Choi, M.-S.: Entropy analysis to classify unknown packing algorithms for malware detection. Int. J. Inf. Secur. 16(3), 227–248 (2017)CrossRef Bat-Erdene, M., Park, H., Li, H., Lee, H., Choi, M.-S.: Entropy analysis to classify unknown packing algorithms for malware detection. Int. J. Inf. Secur. 16(3), 227–248 (2017)CrossRef
10.
go back to reference Bat-Erdene, M., Kim, T., Park, H., Lee, H.: Packer detection for multi-layer executables using entropy analysis. Entropy 19(3), 125 (2017)CrossRef Bat-Erdene, M., Kim, T., Park, H., Lee, H.: Packer detection for multi-layer executables using entropy analysis. Entropy 19(3), 125 (2017)CrossRef
11.
go back to reference Bergenholtz, E., Casalicchio, E., Ilie, D., Moss, A.: Detection of metamorphic malware packers using multilayered LSTM networks. In: International Conference on Information and Communications Security, pp. 36–53. Springer, Berlin (2020) Bergenholtz, E., Casalicchio, E., Ilie, D., Moss, A.: Detection of metamorphic malware packers using multilayered LSTM networks. In: International Conference on Information and Communications Security, pp. 36–53. Springer, Berlin (2020)
12.
go back to reference Biondi, F., Enescu, M.A., Given-Wilson, T., Legay, A., Noureddine, L., Verma, V.: Effective, efficient, and robust packing detection and classification. Comput. Secur. 85, 436–451 (2019)CrossRef Biondi, F., Enescu, M.A., Given-Wilson, T., Legay, A., Noureddine, L., Verma, V.: Effective, efficient, and robust packing detection and classification. Comput. Secur. 85, 436–451 (2019)CrossRef
13.
go back to reference Biryukov, A., Nakahara, J., Jr., Yıldırım, H.M.: Differential entropy analysis of the idea block cipher. J. Comput. Appl. Math. 259, 561–570 (2014)MathSciNetCrossRef Biryukov, A., Nakahara, J., Jr., Yıldırım, H.M.: Differential entropy analysis of the idea block cipher. J. Comput. Appl. Math. 259, 561–570 (2014)MathSciNetCrossRef
14.
go back to reference Blazytko, T., Contag, M., Aschermann, C., Holz, T.: Syntia: synthesizing the semantics of obfuscated code. In: 26th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 17), pp. 643–659 (2017) Blazytko, T., Contag, M., Aschermann, C., Holz, T.: Syntia: synthesizing the semantics of obfuscated code. In: 26th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 17), pp. 643–659 (2017)
15.
go back to reference Bonfante, G., Fernandez, J., Marion, J.-Y., Rouxel, B., Sabatier, F., Thierry, A.: Codisasm: medium scale concatic disassembly of self-modifying binaries with overlapping instructions. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 745–756 (2015) Bonfante, G., Fernandez, J., Marion, J.-Y., Rouxel, B., Sabatier, F., Thierry, A.: Codisasm: medium scale concatic disassembly of self-modifying binaries with overlapping instructions. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 745–756 (2015)
16.
go back to reference Branco, R.R., Barbosa, G.N., Neto, P.D.: Scientific but not academical overview of malware anti-debugging, anti-disassembly and anti-VM technologies. Black. Hat. 1, 1–27 (2012) Branco, R.R., Barbosa, G.N., Neto, P.D.: Scientific but not academical overview of malware anti-debugging, anti-disassembly and anti-VM technologies. Black. Hat. 1, 1–27 (2012)
18.
go back to reference Carvey, H.: Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8. Elsevier, Amsterdam (2014) Carvey, H.: Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8. Elsevier, Amsterdam (2014)
19.
go back to reference Cesare, S., Xiang, Y., Zhou, W.: MALWISE—an effective and efficient classification system for packed and polymorphic malware. IEEE Trans. Comput. 62(6), 1193–1206 (2012)MathSciNetCrossRef Cesare, S., Xiang, Y., Zhou, W.: MALWISE—an effective and efficient classification system for packed and polymorphic malware. IEEE Trans. Comput. 62(6), 1193–1206 (2012)MathSciNetCrossRef
20.
go back to reference Cheng, B., Ming, J., Fu, J., Peng, G., Chen, T., Zhang, X., Marion, J.-Y.: Towards paving the way for large-scale windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 395–411 (2018) Cheng, B., Ming, J., Fu, J., Peng, G., Chen, T., Zhang, X., Marion, J.-Y.: Towards paving the way for large-scale windows malware analysis: Generic binary unpacking with orders-of-magnitude performance boost. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 395–411 (2018)
21.
go back to reference Choi, M.-J., Bang, J., Kim, J., Kim, H., Moon, Y.-S.: All-in-one framework for detection, unpacking, and verification for malware analysis. Secur. Commun. Netw. (2019) Choi, M.-J., Bang, J., Kim, J., Kim, H., Moon, Y.-S.: All-in-one framework for detection, unpacking, and verification for malware analysis. Secur. Commun. Netw. (2019)
22.
go back to reference Choi, Y.-S., Kim, I.-K., Oh, J.-T., Ryou, J.-C.: Pe file header analysis-based packed pe file detection technique (phad). In: International Symposium on Computer Science and its Applications, pp. 28–31. IEEE, (2008) Choi, Y.-S., Kim, I.-K., Oh, J.-T., Ryou, J.-C.: Pe file header analysis-based packed pe file detection technique (phad). In: International Symposium on Computer Science and its Applications, pp. 28–31. IEEE, (2008)
23.
go back to reference Chubachi, Y., Aiko, K.: Tentacle: environment-sensitive malware palpation. PacSec2014 (2014) Chubachi, Y., Aiko, K.: Tentacle: environment-sensitive malware palpation. PacSec2014 (2014)
24.
go back to reference Cozzi, E., Graziano, M., Fratantonio, Y., Balzarotti, D.: Understanding linux malware. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 161–175. IEEE (2018) Cozzi, E., Graziano, M., Fratantonio, Y., Balzarotti, D.: Understanding linux malware. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 161–175. IEEE (2018)
25.
go back to reference Dam, K.H.T., Given-Wilson, T., Legay, A., Veroneze, R.: Packer classification based on association rule mining. Appl. Soft Comput. 127, 109373 (2022)CrossRef Dam, K.H.T., Given-Wilson, T., Legay, A., Veroneze, R.: Packer classification based on association rule mining. Appl. Soft Comput. 127, 109373 (2022)CrossRef
26.
go back to reference D’Elia, D.C., Nicchi, S., Mariani, M., Marini, M., Palmaro, F.: Designing robust API monitoring solutions. arXiv preprint arXiv:2005.00323 (2020) D’Elia, D.C., Nicchi, S., Mariani, M., Marini, M., Palmaro, F.: Designing robust API monitoring solutions. arXiv preprint arXiv:​2005.​00323 (2020)
27.
go back to reference Devi, D., Nandi, S.: PE file features in detection of packed executables. Int. J. Comput. Theory Eng. 4(3), 476 (2012)CrossRef Devi, D., Nandi, S.: PE file features in detection of packed executables. Int. J. Comput. Theory Eng. 4(3), 476 (2012)CrossRef
28.
go back to reference Dolan-Gavitt, B.F., Hodosh, J., Hulin, P., Leek, T., Whelan, R.: Repeatable reverse engineering for the greater good with panda (2014) Dolan-Gavitt, B.F., Hodosh, J., Hulin, P., Leek, T., Whelan, R.: Repeatable reverse engineering for the greater good with panda (2014)
29.
go back to reference Structural entropy and metamorphic malware: Donabelle, B., Richard, M.L., Mark. S. J. Comput. Virol. Hack. Tech. 9, 179–192 (2013) Structural entropy and metamorphic malware: Donabelle, B., Richard, M.L., Mark. S. J. Comput. Virol. Hack. Tech. 9, 179–192 (2013)
31.
go back to reference Eagle, C.: The IDA pro book. No starch press (2011) Eagle, C.: The IDA pro book. No starch press (2011)
32.
go back to reference Ebringer, T., Sun, L., Boztas, S.: A fast randomness test that preserves local detail. In: Proceedings of the 18th Virus Bulletin International Conference, pp. 34–42. Virus Bulletin Ltd (2008) Ebringer, T., Sun, L., Boztas, S.: A fast randomness test that preserves local detail. In: Proceedings of the 18th Virus Bulletin International Conference, pp. 34–42. Virus Bulletin Ltd (2008)
33.
go back to reference Fang, Y., Zeng, Y.: Deepdetectnet vs Rlattacknet: an adversarial method to improve deep learning-based static malware detection model. PLoS ONE 15(4), e0231626 (2020)MathSciNetCrossRef Fang, Y., Zeng, Y.: Deepdetectnet vs Rlattacknet: an adversarial method to improve deep learning-based static malware detection model. PLoS ONE 15(4), e0231626 (2020)MathSciNetCrossRef
34.
go back to reference Farinholt, B., Rezaeirad, M., Pearce, P., Dharmdasani, H., Yin, H., Le Blond, S., McCoy, D., Levchenko, K.: To catch a ratter: monitoring the behavior of amateur darkcomet rat operators in the wild. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 770–787. IEEE (2017) Farinholt, B., Rezaeirad, M., Pearce, P., Dharmdasani, H., Yin, H., Le Blond, S., McCoy, D., Levchenko, K.: To catch a ratter: monitoring the behavior of amateur darkcomet rat operators in the wild. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 770–787. IEEE (2017)
35.
go back to reference Gao, X., Changzhen, H., Shan, C., Han, W.: Malicage: a packed malware family classification framework based on DNN and GAN. J. Inf. Secur. Appl. 68, 103267 (2022) Gao, X., Changzhen, H., Shan, C., Han, W.: Malicage: a packed malware family classification framework based on DNN and GAN. J. Inf. Secur. Appl. 68, 103267 (2022)
36.
go back to reference Guide, P.: Intel® 64 and IA-32 architectures software developer’s manual. Volume 3B: System programming Guide, Part, 2(11), 1–64 (2011) Guide, P.: Intel® 64 and IA-32 architectures software developer’s manual. Volume 3B: System programming Guide, Part, 2(11), 1–64 (2011)
37.
go back to reference HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.-K.R.: A deep recurrent neural network based approach for internet of things malware threat hunting. Fut. Gener. Comput. Syst. 85, 88–96 (2018)CrossRef HaddadPajouh, H., Dehghantanha, A., Khayami, R., Choo, K.-K.R.: A deep recurrent neural network based approach for internet of things malware threat hunting. Fut. Gener. Comput. Syst. 85, 88–96 (2018)CrossRef
38.
go back to reference Hai, N.M., Ogawa, M., Tho, Q.T.: Packer identification based on metadata signature. In: Proceedings of the 7th Software Security, Protection, and Reverse Engineering/Software Security and Protection Workshop, pp. 1–11 (2017) Hai, N.M., Ogawa, M., Tho, Q.T.: Packer identification based on metadata signature. In: Proceedings of the 7th Software Security, Protection, and Reverse Engineering/Software Security and Protection Workshop, pp. 1–11 (2017)
39.
go back to reference Herrmann, D.: Cyber Espionage and Cyber Defence, pp. 83–106. Springer Fachmedien Wiesbaden, Wiesbaden (2019) Herrmann, D.: Cyber Espionage and Cyber Defence, pp. 83–106. Springer Fachmedien Wiesbaden, Wiesbaden (2019)
43.
go back to reference Hsiao, S.-C., Kao, D.-Y., Tso, R.: Malware-detection model using learning-based discovery of static features. In: 2018 IEEE Conference on Application, Information and Network Security (AINS), pp. 54–59. IEEE (2018) Hsiao, S.-C., Kao, D.-Y., Tso, R.: Malware-detection model using learning-based discovery of static features. In: 2018 IEEE Conference on Application, Information and Network Security (AINS), pp. 54–59. IEEE (2018)
44.
go back to reference Jacob, G., Comparetti, P.M., Neugschwandtner, M., Kruegel, C., Vigna, G.: A static, packer-agnostic filter to detect similar malware samples. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 102–122. Springer, Berlin (2012) Jacob, G., Comparetti, P.M., Neugschwandtner, M., Kruegel, C., Vigna, G.: A static, packer-agnostic filter to detect similar malware samples. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 102–122. Springer, Berlin (2012)
45.
go back to reference Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V., Wang, C.: Cyber Warfare: Building the Scientific Foundation, vol. 56. Springer, Berlin (2015)CrossRef Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V., Wang, C.: Cyber Warfare: Building the Scientific Foundation, vol. 56. Springer, Berlin (2015)CrossRef
46.
go back to reference Jeong, G., Choo, E., Lee, J., Bat-Erdene, M., Lee, H.: Generic unpacking using entropy analysis. In: 2010 5th International Conference on Malicious and Unwanted Software, pp. 98–105. IEEE (2010) Jeong, G., Choo, E., Lee, J., Bat-Erdene, M., Lee, H.: Generic unpacking using entropy analysis. In: 2010 5th International Conference on Malicious and Unwanted Software, pp. 98–105. IEEE (2010)
47.
go back to reference Jin, Q., Duan, J., Vasudevan, S., Bailey, M.: Packer classifier based on PE header information. In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, pp. 1–2 (2015) Jin, Q., Duan, J., Vasudevan, S., Bailey, M.: Packer classifier based on PE header information. In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, pp. 1–2 (2015)
48.
go back to reference Jung, B.H., Bae, S.I., Choi, C., Im, E.G.: Packer identification method based on byte sequences. Concurr. Comput.: Pract. Exp. 32(8), e5082 (2020)CrossRef Jung, B.H., Bae, S.I., Choi, C., Im, E.G.: Packer identification method based on byte sequences. Concurr. Comput.: Pract. Exp. 32(8), e5082 (2020)CrossRef
49.
go back to reference Kancherla, K., Donahue, J., Mukkamala, S.: Packer identification using byte plot and Markov plot. J. Comput. Virol. Hack. Tech. 12(2), 101–111 (2016)CrossRef Kancherla, K., Donahue, J., Mukkamala, S.: Packer identification using byte plot and Markov plot. J. Comput. Virol. Hack. Tech. 12(2), 101–111 (2016)CrossRef
51.
go back to reference Kim, J.-W., Moon, Y.-S., Choi, M.-J: An efficient multi-step framework for malware packing identification. arXiv preprint arXiv:2208.08071 (2022) Kim, J.-W., Moon, Y.-S., Choi, M.-J: An efficient multi-step framework for malware packing identification. arXiv preprint arXiv:​2208.​08071 (2022)
55.
go back to reference Lau, B., Svajcer, V.: Measuring virtual machine detection in malware using DSD tracer. J. Comput. Virol. 6(3), 181–195 (2010)CrossRef Lau, B., Svajcer, V.: Measuring virtual machine detection in malware using DSD tracer. J. Comput. Virol. 6(3), 181–195 (2010)CrossRef
57.
go back to reference Laxmi, V., Gaur, M.S., Faruki, P., Naval, S.: Peal-packed executable analysis. In: International Conference on Advanced Computing, Networking and Security, pp. 237–243. Springer, Berlin (2011) Laxmi, V., Gaur, M.S., Faruki, P., Naval, S.: Peal-packed executable analysis. In: International Conference on Advanced Computing, Networking and Security, pp. 237–243. Springer, Berlin (2011)
58.
go back to reference Lee, Y.B., Suk, J.H., Lee, D.H.: Bypassing anti-analysis of commercial protector methods using DBI tools. IEEE Access 9, 7655–7673 (2021)CrossRef Lee, Y.B., Suk, J.H., Lee, D.H.: Bypassing anti-analysis of commercial protector methods using DBI tools. IEEE Access 9, 7655–7673 (2021)CrossRef
59.
go back to reference Li, X., Shan, Z., Liu, F., Chen, Y., Hou, Y.: A consistently-executing graph-based approach for malware packer identification. IEEE Access 7, 51620–51629 (2019)CrossRef Li, X., Shan, Z., Liu, F., Chen, Y., Hou, Y.: A consistently-executing graph-based approach for malware packer identification. IEEE Access 7, 51620–51629 (2019)CrossRef
60.
go back to reference Lim, C., Ramli, K., Kotualubun, Y.S., et al.: Mal-flux: rendering hidden code of packed binary executable. Digit. Investig. 28, 83–95 (2019)CrossRef Lim, C., Ramli, K., Kotualubun, Y.S., et al.: Mal-flux: rendering hidden code of packed binary executable. Digit. Investig. 28, 83–95 (2019)CrossRef
61.
go back to reference Liţă, C.V., Cosovan, D., Gavriluţ, D.: Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers. J. Comput. Virol. Hack. Tech. 14(2), 107–126 (2018)CrossRef Liţă, C.V., Cosovan, D., Gavriluţ, D.: Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers. J. Comput. Virol. Hack. Tech. 14(2), 107–126 (2018)CrossRef
62.
go back to reference Liu, H, Guo, C., Cui, Y., Shen, G., Ping, Y.: 2-spiff: a 2-stage packer identification method based on function call graph and file attributes. Appl. Intell. pp. 1–16 (2021) Liu, H, Guo, C., Cui, Y., Shen, G., Ping, Y.: 2-spiff: a 2-stage packer identification method based on function call graph and file attributes. Appl. Intell. pp. 1–16 (2021)
63.
go back to reference Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. ACM Sigplan Notices 40(6), 190–200 (2005)CrossRef Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. ACM Sigplan Notices 40(6), 190–200 (2005)CrossRef
64.
go back to reference Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Secur. Priv. 5(2), 40–45 (2007)CrossRef Lyda, R., Hamrock, J.: Using entropy analysis to find encrypted and packed malware. IEEE Secur. Priv. 5(2), 40–45 (2007)CrossRef
65.
go back to reference Lyu, F., Lin, Y., Yang, J.: An efficient and packing-resilient two-phase android cloned application detection approach. Mobile Inf. Syst. 2017, Art. no. 6958698, (2017) Lyu, F., Lin, Y., Yang, J.: An efficient and packing-resilient two-phase android cloned application detection approach. Mobile Inf. Syst. 2017, Art. no. 6958698, (2017)
66.
go back to reference Malin, C.H., Casey, E., Aquilina, J.M.: Malware forensics field guide for Linux systems: digital forensics field guides. Syngress, an imprint of Elsevier (2013) Malin, C.H., Casey, E., Aquilina, J.M.: Malware forensics field guide for Linux systems: digital forensics field guides. Syngress, an imprint of Elsevier (2013)
67.
go back to reference Aqulina, J.M., Casey, E., Malin, C.H.: Malware forensics: investigating and analyzing Malicious Code. Syngress, an imprint of Elsevier (2008) Aqulina, J.M., Casey, E., Malin, C.H.: Malware forensics: investigating and analyzing Malicious Code. Syngress, an imprint of Elsevier (2008)
68.
go back to reference Mantovani, A., Aonzo, S., Ugarte-Pedrero, X., Merlo, A., Balzarotti, D.: Prevalence and impact of low-entropy packing schemes in the malware ecosystem. In: Network and Distributed System Security (NDSS) Symposium, NDSS, vol. 20 (2020) Mantovani, A., Aonzo, S., Ugarte-Pedrero, X., Merlo, A., Balzarotti, D.: Prevalence and impact of low-entropy packing schemes in the malware ecosystem. In: Network and Distributed System Security (NDSS) Symposium, NDSS, vol. 20 (2020)
69.
go back to reference Martignoni, L., Christodorescu, M., Jha, S.: Omniunpack: fast, generic, and safe unpacking of malware. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp. 431–441. IEEE (2007) Martignoni, L., Christodorescu, M., Jha, S.: Omniunpack: fast, generic, and safe unpacking of malware. In: Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp. 431–441. IEEE (2007)
71.
go back to reference Menéndez, H.D., Llorente, J.L.: Mimicking anti-viruses with machine learning and entropy profiles. Entropy 21(5), 513 (2019)CrossRef Menéndez, H.D., Llorente, J.L.: Mimicking anti-viruses with machine learning and entropy profiles. Entropy 21(5), 513 (2019)CrossRef
72.
go back to reference Menéndez, H.D., Bhattacharya, S., Clark, D., Barr, E.T.: The arms race. Adversarial search defeats entropy used to detect malware. Expert Syst. Appl. 118, 246–260 (2019)CrossRef Menéndez, H.D., Bhattacharya, S., Clark, D., Barr, E.T.: The arms race. Adversarial search defeats entropy used to detect malware. Expert Syst. Appl. 118, 246–260 (2019)CrossRef
73.
go back to reference Menéndez, H.D., Clark, D., Barr, E.T.: Getting ahead of the arms race: hothousing the coevolution of virustotal with a packer. Entropy 23(4), 395 (2021)CrossRef Menéndez, H.D., Clark, D., Barr, E.T.: Getting ahead of the arms race: hothousing the coevolution of virustotal with a packer. Entropy 23(4), 395 (2021)CrossRef
74.
go back to reference Munkhbayar, B.-E., Kim, T., Li, H., Lee, H.: Dynamic classification of packing algorithms for inspecting executables using entropy analysis. In: 2013 8th International Conference on Malicious and Unwanted Software: “The Americas”(MALWARE), pp. 19–26. IEEE (2013) Munkhbayar, B.-E., Kim, T., Li, H., Lee, H.: Dynamic classification of packing algorithms for inspecting executables using entropy analysis. In: 2013 8th International Conference on Malicious and Unwanted Software: “The Americas”(MALWARE), pp. 19–26. IEEE (2013)
75.
go back to reference Naval, S., Laxmi, V., Gaurm M.S., Vinod, P.: Escape: entropy score analysis of packed executable. In: Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 197–200 (2012) Naval, S., Laxmi, V., Gaurm M.S., Vinod, P.: Escape: entropy score analysis of packed executable. In: Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 197–200 (2012)
76.
go back to reference Naval, S., Laxmi, V., Gaur, M.S., Vinod, P.: Spade: signature based packer detection. In: Proceedings of the First International Conference on Security of Internet of Things, pp. 96–101 (2012) Naval, S., Laxmi, V., Gaur, M.S., Vinod, P.: Spade: signature based packer detection. In: Proceedings of the First International Conference on Security of Internet of Things, pp. 96–101 (2012)
77.
go back to reference Naval, S., Laxmi, V., Gaur, M.S., et al.: An efficient block-discriminant identification of packed malware. Sadhana 40(5), 1435–1456 (2015)CrossRef Naval, S., Laxmi, V., Gaur, M.S., et al.: An efficient block-discriminant identification of packed malware. Sadhana 40(5), 1435–1456 (2015)CrossRef
79.
go back to reference Noureddine, L., Heuser, A., Puodzius, C., Zendra, O.: SE-PAC: a self-evolving packer classifier against rapid packers evolution. In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, pp. 281–292 (2021) Noureddine, L., Heuser, A., Puodzius, C., Zendra, O.: SE-PAC: a self-evolving packer classifier against rapid packers evolution. In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, pp. 281–292 (2021)
81.
go back to reference Okane, P., Sezer, S., McLaughlinm, K.: Detecting obfuscated malware using reduced opcode set and optimised runtime trace. Secur. Inform. 5(1), 1–12 (2016) Okane, P., Sezer, S., McLaughlinm, K.: Detecting obfuscated malware using reduced opcode set and optimised runtime trace. Secur. Inform. 5(1), 1–12 (2016)
83.
go back to reference Omachi, R., Murakami, Y.: Packer identification method for multi-layer executables with k-nearest neighbor of entropies. In: 2020 International Symposium on Information Theory and Its Applications (ISITA), pp. 504–508. IEEE (2020) Omachi, R., Murakami, Y.: Packer identification method for multi-layer executables with k-nearest neighbor of entropies. In: 2020 International Symposium on Information Theory and Its Applications (ISITA), pp. 504–508. IEEE (2020)
85.
go back to reference Oriyano, S.-P.: CEH v9: Certified Ethical Hacker Version 9 Study Guide. Wiley, Hoboken (2016)CrossRef Oriyano, S.-P.: CEH v9: Certified Ethical Hacker Version 9 Study Guide. Wiley, Hoboken (2016)CrossRef
86.
go back to reference Park, L.H., Yu, J., Kang, H.-K., Lee, T., Kwon, T.: Birds of a feature: intrafamily clustering for version identification of packed malware. IEEE Syst. J. 14(3), 4545–4556 (2020)CrossRef Park, L.H., Yu, J., Kang, H.-K., Lee, T., Kwon, T.: Birds of a feature: intrafamily clustering for version identification of packed malware. IEEE Syst. J. 14(3), 4545–4556 (2020)CrossRef
88.
go back to reference Perdisci, R., Lanzi, A., Lee, W.: Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29(14), 1941–1946 (2008)CrossRef Perdisci, R., Lanzi, A., Lee, W.: Classification of packed executables for accurate computer virus detection. Pattern Recognit. Lett. 29(14), 1941–1946 (2008)CrossRef
90.
go back to reference Raju, A.D., AbuAlhaol, I., Giagone, R.S., Zhou, Y., Shengqiang, H.: A survey on cross-architectural IoT malware threat hunting, IEEE Access (2021) Raju, A.D., AbuAlhaol, I., Giagone, R.S., Zhou, Y., Shengqiang, H.: A survey on cross-architectural IoT malware threat hunting, IEEE Access (2021)
94.
go back to reference Rohleder, R.: Hands-on Ghidra—a tutorial about the software reverse engineering framework. In: Proceedings of the 3rd ACM Workshop on Software Protection, pp. 77–78 (2019) Rohleder, R.: Hands-on Ghidra—a tutorial about the software reverse engineering framework. In: Proceedings of the 3rd ACM Workshop on Software Protection, pp. 77–78 (2019)
95.
go back to reference Saleh, M., Ratazzi, E.P., Xu, S.: A control flow graph-based signature for packer identification. In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), pp. 683–688. IEEE (2017) Saleh, M., Ratazzi, E.P., Xu, S.: A control flow graph-based signature for packer identification. In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), pp. 683–688. IEEE (2017)
96.
go back to reference Saleh, M., Ratazzi, E.P., Xu, S.: Instructions-based detection of sophisticated obfuscation and packing. In: 2014 IEEE Military Communications Conference, pp. 1–6. IEEE (2014) Saleh, M., Ratazzi, E.P., Xu, S.: Instructions-based detection of sophisticated obfuscation and packing. In: 2014 IEEE Military Communications Conference, pp. 1–6. IEEE (2014)
97.
go back to reference Santos, I., Ugarte-Pedrero, X., Sanz, B., Laorden, C., Bringas, P.G.: Collective classification for packed executable identification. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pp. 23–30 (2011) Santos, I., Ugarte-Pedrero, X., Sanz, B., Laorden, C., Bringas, P.G.: Collective classification for packed executable identification. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pp. 23–30 (2011)
98.
go back to reference Shafiq, M.Z., Tabish, S., Farooq, M.: Pe-probe: leveraging packer detection and structural information to detect malicious portable executables. In: Proceedings of the Virus Bulletin Conference (VB), vol. 8 (2009) Shafiq, M.Z., Tabish, S., Farooq, M.: Pe-probe: leveraging packer detection and structural information to detect malicious portable executables. In: Proceedings of the Virus Bulletin Conference (VB), vol. 8 (2009)
100.
go back to reference Sharif, M., Yegneswaran, V., Saidi, H., Porras, P., Lee, W.: Eureka: a framework for enabling static malware analysis. In: European Symposium on Research in Computer Security, pp. 481–500. Springer, Berlin (2008) Sharif, M., Yegneswaran, V., Saidi, H., Porras, P., Lee, W.: Eureka: a framework for enabling static malware analysis. In: European Symposium on Research in Computer Security, pp. 481–500. Springer, Berlin (2008)
101.
go back to reference Siglidis, G., Nikolentzos, G., Limnios, S., Giatsidis, C., Skianis, K., Vazirgiannis, M.: Grakel: a graph kernel library in python. J. Mach. Learn. Res. 21, 54–1 (2020) Siglidis, G., Nikolentzos, G., Limnios, S., Giatsidis, C., Skianis, K., Vazirgiannis, M.: Grakel: a graph kernel library in python. J. Mach. Learn. Res. 21, 54–1 (2020)
102.
go back to reference Singh, A., Arora, R., Pareek, H.: Malware analysis using multiple API sequence mining control flow graph. arXiv preprint arXiv:1707.02691 (2017) Singh, A., Arora, R., Pareek, H.: Malware analysis using multiple API sequence mining control flow graph. arXiv preprint arXiv:​1707.​02691 (2017)
104.
go back to reference Suk, J.H., Lee, J.-Y., Jin, H., Kim, I.S., Lee, D.H.: Unthemida: commercial obfuscation technique analysis with a fully obfuscated program. Software: Pract Exp. 48(12), 2331–2349 (2018) Suk, J.H., Lee, J.-Y., Jin, H., Kim, I.S., Lee, D.H.: Unthemida: commercial obfuscation technique analysis with a fully obfuscated program. Software: Pract Exp. 48(12), 2331–2349 (2018)
105.
go back to reference Sun, L., Versteeg, S., Boztaş, S., Yann, T.: Pattern recognition techniques for the classification of malware packers. In: Australasian Conference on Information Security and Privacy, pp. 370–390. Springer, Berlin (2010) Sun, L., Versteeg, S., Boztaş, S., Yann, T.: Pattern recognition techniques for the classification of malware packers. In: Australasian Conference on Information Security and Privacy, pp. 370–390. Springer, Berlin (2010)
107.
go back to reference Ugarte-Pedrero, X., Balzarotti, D., Santos, I., Bringas, P.G.: Sok: deep packer inspection: a longitudinal study of the complexity of run-time packers. In: 2015 IEEE Symposium on Security and Privacy, pp. 659–673. IEEE (2015) Ugarte-Pedrero, X., Balzarotti, D., Santos, I., Bringas, P.G.: Sok: deep packer inspection: a longitudinal study of the complexity of run-time packers. In: 2015 IEEE Symposium on Security and Privacy, pp. 659–673. IEEE (2015)
108.
go back to reference Ugarte-Pedrero, X., Santos, I., Bringas, P.G., Gastesi, M., Esparza, J.M.: Semi-supervised learning for packed executable detection. In: 2011 5th International Conference on Network and System Security, pp. 342–346. IEEE (2011) Ugarte-Pedrero, X., Santos, I., Bringas, P.G., Gastesi, M., Esparza, J.M.: Semi-supervised learning for packed executable detection. In: 2011 5th International Conference on Network and System Security, pp. 342–346. IEEE (2011)
109.
go back to reference Ugarte-Pedrero, X., Santos, I., García-Ferreira, I., Huerta, S., Sanz, B., Bringas, P.G.: On the adoption of anomaly detection for packed executable filtering. Comput. Secur. 43, 126–144 (2014)CrossRef Ugarte-Pedrero, X., Santos, I., García-Ferreira, I., Huerta, S., Sanz, B., Bringas, P.G.: On the adoption of anomaly detection for packed executable filtering. Comput. Secur. 43, 126–144 (2014)CrossRef
110.
go back to reference Ullah, S., Jin, W., Heekuck, O.: Efficient features for function matching in multi-architecture binary executables. IEEE Access 9, 104950–104968 (2021)CrossRef Ullah, S., Jin, W., Heekuck, O.: Efficient features for function matching in multi-architecture binary executables. IEEE Access 9, 104950–104968 (2021)CrossRef
111.
go back to reference Usaphapanus, P., Piromsopa, K.: Classification of computer viruses from binary code using ensemble classifier and recursive feature elimination. In: 2017 Twelfth International Conference on Digital Information Management (ICDIM), pp. 27–31 (2017) Usaphapanus, P., Piromsopa, K.: Classification of computer viruses from binary code using ensemble classifier and recursive feature elimination. In: 2017 Twelfth International Conference on Digital Information Management (ICDIM), pp. 27–31 (2017)
112.
go back to reference Van Ouytsel, C.-H.B., Given-Wilson, T., Minet, J., Roussieau, J., Legay, A.: Analysis of machine learning approaches to packing detection. arXiv preprint arXiv:2105.00473, 2021 Van Ouytsel, C.-H.B., Given-Wilson, T., Minet, J., Roussieau, J., Legay, A.: Analysis of machine learning approaches to packing detection. arXiv preprint arXiv:​2105.​00473, 2021
113.
go back to reference Vidyarthi, D., Damri, G., Rakshit, S., Suthikshn Kumar, C.R., Chansarkar, S.: Classification of malicious process using high-level activity based dynamic analysis. Secur. Priv. 2(6), e86 (2019)CrossRef Vidyarthi, D., Damri, G., Rakshit, S., Suthikshn Kumar, C.R., Chansarkar, S.: Classification of malicious process using high-level activity based dynamic analysis. Secur. Priv. 2(6), e86 (2019)CrossRef
115.
go back to reference Zakeri, M., Faraji Daneshga, F., Abbaspour, M.: A static heuristic approach to detecting malware targets. Secur. Commun. Netw. 8(17), 3015–3027 (2015)CrossRef Zakeri, M., Faraji Daneshga, F., Abbaspour, M.: A static heuristic approach to detecting malware targets. Secur. Commun. Netw. 8(17), 3015–3027 (2015)CrossRef
Metadata
Title
A survey on run-time packers and mitigation techniques
Authors
Ehab Alkhateeb
Ali Ghorbani
Arash Habibi Lashkari
Publication date
01-11-2023
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Information Security / Issue 2/2024
Print ISSN: 1615-5262
Electronic ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-023-00759-y

Other articles of this Issue 2/2024

International Journal of Information Security 2/2024 Go to the issue

Premium Partner