Skip to main content

2024 | OriginalPaper | Buchkapitel

Enhancing Code Obfuscation Techniques: Exploring the Impact of Artificial Intelligence on Malware Detection

verfasst von : Christian Catalano, Giorgia Specchia, Nicolò G. Totaro

Erschienen in: Product-Focused Software Process Improvement

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Code obfuscation techniques serve to obscure proprietary code, and there are several types. Various tools, such as reverse engineering, are used to reconstruct obfuscated code. To make the analysis and decoding of obfuscated code more difficult, obfuscation techniques can be combined in cascades. Artificial Intelligence (AI) can be used to recombine old codes with each other and make it more difficult to decrypt them. In this paper, the focus is precisely on the increased complexity of the process of reconstructing proprietary code if it is generated with the aid of AI, and consequently on the increasing difficulty for antiviruses in detecting this new type of malware.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Angelelli, M., Konopelchenko, B.: Geometry of basic statistical physics mapping. J. Phys. A: Math. Theor. 49(38), 385202 (2016)MathSciNetCrossRefMATH Angelelli, M., Konopelchenko, B.: Geometry of basic statistical physics mapping. J. Phys. A: Math. Theor. 49(38), 385202 (2016)MathSciNetCrossRefMATH
2.
Zurück zum Zitat Angelelli, M., Konopelchenko, B.: Entropy driven transformations of statistical hypersurfaces. Rev. Math. Phys. 33, 02 (2021)MathSciNetCrossRefMATH Angelelli, M., Konopelchenko, B.: Entropy driven transformations of statistical hypersurfaces. Rev. Math. Phys. 33, 02 (2021)MathSciNetCrossRefMATH
3.
Zurück zum Zitat Baldassarre, M.T., Barletta, V.S., Caivano, D.: Smart program management in a smart city. In: AEIT International Annual Conference, Bari, Italy, pp. 1–6 (2018) Baldassarre, M.T., Barletta, V.S., Caivano, D.: Smart program management in a smart city. In: AEIT International Annual Conference, Bari, Italy, pp. 1–6 (2018)
4.
Zurück zum Zitat Barletta, V.S., Caivano, D., De Vincentiis, M., Magri, A., Piccinno, A.: Quantum optimization for IoT security detection. In: Julian, V., Carneiro, J., Alonso, R.S., Chamoso, P., Novais, P. (eds.) Ambient Intelligence-Software and Applications-13th International Symposium on Ambient Intelligence. Lecture Notes in Networks and Systems, vol. 603. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-22356-3_18 Barletta, V.S., Caivano, D., De Vincentiis, M., Magri, A., Piccinno, A.: Quantum optimization for IoT security detection. In: Julian, V., Carneiro, J., Alonso, R.S., Chamoso, P., Novais, P. (eds.) Ambient Intelligence-Software and Applications-13th International Symposium on Ambient Intelligence. Lecture Notes in Networks and Systems, vol. 603. Springer, Cham (2023). https://​doi.​org/​10.​1007/​978-3-031-22356-3_​18
5.
Zurück zum Zitat Catalano, C., et al.: Security testing reuse enhancing active cyber defence in public administration. In: ITASEC, pp. 120–132 (2021) Catalano, C., et al.: Security testing reuse enhancing active cyber defence in public administration. In: ITASEC, pp. 120–132 (2021)
6.
Zurück zum Zitat Catalano, C., Chezzi, A., Angelelli, M., Tommasi, F.: Deceiving AI-based malware detection through polymorphic attacks. Comput. Ind. 143, 103751 (2022)CrossRef Catalano, C., Chezzi, A., Angelelli, M., Tommasi, F.: Deceiving AI-based malware detection through polymorphic attacks. Comput. Ind. 143, 103751 (2022)CrossRef
7.
Zurück zum Zitat Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: 12th USENIX Security Symposium (USENIX Security 03) (2003) Christodorescu, M., Jha, S.: Static analysis of executables to detect malicious patterns. In: 12th USENIX Security Symposium (USENIX Security 03) (2003)
8.
Zurück zum Zitat Corallo, A., Crespino, A.M., Del Vecchio, V., Gervasi, M., Lazoi, M., Marra, M.: Evaluating maturity level of big data management and analytics in industrial companies. Technol. Forecast. Soc. Change 196, 122826 (2023)CrossRef Corallo, A., Crespino, A.M., Del Vecchio, V., Gervasi, M., Lazoi, M., Marra, M.: Evaluating maturity level of big data management and analytics in industrial companies. Technol. Forecast. Soc. Change 196, 122826 (2023)CrossRef
9.
Zurück zum Zitat D’Urbano A., Chezzi A., Catalano, C.: A new adversarial training approach based on CTF D’Urbano A., Chezzi A., Catalano, C.: A new adversarial training approach based on CTF
10.
Zurück zum Zitat Gervasi, M., Totaro, N.G., Fornaio, A., Caivano, D.: Big data value graph: enhancing security and generating new value from big data. Accepted for the publication at ITASEC2023 Gervasi, M., Totaro, N.G., Fornaio, A., Caivano, D.: Big data value graph: enhancing security and generating new value from big data. Accepted for the publication at ITASEC2023
11.
Zurück zum Zitat Gervasi, M., Totaro, N.G., Specchia, G., Latino, M.E.: Unveiling the roots of big data project failure: a critical analysis of the distinguishing features and uncertainties in evaluating big data potential value. Accepted for the publication at ITADATA2023 Gervasi, M., Totaro, N.G., Specchia, G., Latino, M.E.: Unveiling the roots of big data project failure: a critical analysis of the distinguishing features and uncertainties in evaluating big data potential value. Accepted for the publication at ITADATA2023
12.
Zurück zum Zitat Hossain, M.: Sharing economy: a comprehensive literature review. Int. J. Hosp. Manag. 87, 102470 (2020)CrossRef Hossain, M.: Sharing economy: a comprehensive literature review. Int. J. Hosp. Manag. 87, 102470 (2020)CrossRef
13.
Zurück zum Zitat Konstantinou, E., Wolthusen, S.: Metamorphic virus: analysis and detection. R. Holloway Univ. Lond. 15, 15 (2008) Konstantinou, E., Wolthusen, S.: Metamorphic virus: analysis and detection. R. Holloway Univ. Lond. 15, 15 (2008)
14.
Zurück zum Zitat Pfeffer, A., et al.: Malware analysis and attribution using genetic information. In: 2012 7th International Conference on Malicious and Unwanted Software (2012) Pfeffer, A., et al.: Malware analysis and attribution using genetic information. In: 2012 7th International Conference on Malicious and Unwanted Software (2012)
15.
Zurück zum Zitat Szor, P.: The Art of Computer Virus Research and Defense: Art Comp Virus Res Defense _p1. Pearson Education, London (2005) Szor, P.: The Art of Computer Virus Research and Defense: Art Comp Virus Res Defense _p1. Pearson Education, London (2005)
16.
Zurück zum Zitat Tommasi, F., et al.: MinerAlert: an hybrid approach for web mining detection. J. Comput. Virol. Hack. Tech. 18, 333–346 (2022)CrossRef Tommasi, F., et al.: MinerAlert: an hybrid approach for web mining detection. J. Comput. Virol. Hack. Tech. 18, 333–346 (2022)CrossRef
17.
Zurück zum Zitat Wilhoite, K.: Code Obfuscation methods and practicality within automation (2023) Wilhoite, K.: Code Obfuscation methods and practicality within automation (2023)
18.
Zurück zum Zitat Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2, 211–229 (2006)CrossRef Wong, W., Stamp, M.: Hunting for metamorphic engines. J. Comput. Virol. 2, 211–229 (2006)CrossRef
19.
Zurück zum Zitat You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297–300. IEEE (2010) You, I., Yim, K.: Malware obfuscation techniques: a brief survey. In: 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, pp. 297–300. IEEE (2010)
Metadaten
Titel
Enhancing Code Obfuscation Techniques: Exploring the Impact of Artificial Intelligence on Malware Detection
verfasst von
Christian Catalano
Giorgia Specchia
Nicolò G. Totaro
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-49269-3_8

Premium Partner