Detecting Packed Executables using Steganalysis


Autoria(s): Burgess, Colin; Kurugollu, Fatih; Sezer, Sakir; McLaughlin, Keiran
Data(s)

01/12/2014

Resumo

This paper proposes a novel method of detecting packed executable files using steganalysis, primarily targeting the detection of obfuscated malware through packing. Considering that over 80% of malware in the wild is packed, detection accuracy and low false negative rates are important properties of malware detection methods. Experimental results outlined in this paper reveal that the proposed approach achieving an overall detection accuracy of greater than 99%, a false negative rate of 1% and a false positive rate of 0%.

Identificador

http://pure.qub.ac.uk/portal/en/publications/detecting-packed-executables-using-steganalysis(c9002d82-0f14-4d51-bd82-334409ace1ab).html

http://dx.doi.org/10.1109/EUVIP.2014.7018361

Idioma(s)

eng

Publicador

Institute of Electrical and Electronics Engineers (IEEE)

Direitos

info:eu-repo/semantics/restrictedAccess

Fonte

Burgess , C , Kurugollu , F , Sezer , S & McLaughlin , K 2014 , Detecting Packed Executables using Steganalysis . in 5th European Workshop on Visual Information Processing (EUVIP) . Institute of Electrical and Electronics Engineers (IEEE) , pp. 101-105 , 5th European Workshop on Visual Information Processing, EUVIP 2014 , Paris , France , 10-12 December . DOI: 10.1109/EUVIP.2014.7018361

Tipo

contributionToPeriodical