359 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author임을규-
dc.date.accessioned2021-10-25T06:10:13Z-
dc.date.available2021-10-25T06:10:13Z-
dc.date.issued2020-04-
dc.identifier.citationCONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, v. 32, no. 8, article no. e5082en_US
dc.identifier.issn1532-0626-
dc.identifier.issn1532-0634-
dc.identifier.urihttps://onlinelibrary.wiley.com/doi/10.1002/cpe.5082-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/165711-
dc.description.abstractWith the growing number of malware, malware analysis technologies need to be advanced continuously. Malware authors use various packing techniques to hide their code from malware detection tools and techniques. The packing techniques are generally used to compress and encrypt executable code in executable files, and the unpacking code is usually embedded in the executable files. Therefore, packed executable files can be executed by itself, and the information associated with packing can be used to analyze and detect malware. Since different packing tools will generate different packed executable files, packing tools can be identified by analyzing packed executable files, and packer identification can reduce malware-analyzing overheads, and the executable files can even be unpacked. However, most previous studies focused on packing detection using signatures of unpacking code, and these approaches can be avoided by placing unpacking code in other locations or by distributing unpacking code in multiple locations. In this paper, we propose a new packer identification method by analyzing only code sections to extract features of malware generated by different packing tools. Experimental results show that our approach can identify different packing tools with the accuracy of 91.6% on average. Considering packer identification is the harder problem than packing detection, we argue that our approach can contribute to reducing overheads of malware analysis.en_US
dc.language.isoenen_US
dc.publisherWILEYen_US
dc.subjectmachine learningen_US
dc.subjectmalware analysisen_US
dc.subjectobfuscationen_US
dc.subjectpacking detectionen_US
dc.titlePacker identification method based on byte sequencesen_US
dc.typeArticleen_US
dc.relation.no8-
dc.relation.volume32-
dc.identifier.doiArticle Numbere5082-
dc.identifier.doi10.1002/cpe.5082-
dc.relation.page1-11-
dc.relation.journalCONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE-
dc.contributor.googleauthorJung, ByeongHo-
dc.contributor.googleauthorBae, Seong Il-
dc.contributor.googleauthorChoi, Chang-
dc.contributor.googleauthorIm, Eul Gyu-
dc.relation.code2020050908-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentSCHOOL OF COMPUTER SCIENCE-
dc.identifier.pidimeg-
dc.identifier.researcherIDAAR-5690-2021-
dc.identifier.orcidhttps://orcid.org/0000-0002-4130-513X-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > COMPUTER SCIENCE(컴퓨터소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE