Authors
Erik Bergenholtz, Emiliano Casalicchio, Dragos Ilie, Andrew Moss
Publication date
2020
Conference
Information and Communications Security: 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings 22
Pages
36-53
Publisher
Springer International Publishing
Description
Malware authors do their best to conceal their malicious software to increase its probability of spreading and to slow down analysis. One method used to conceal malware is packing, in which the original malware is completely hidden through compression or encryption, only to be reconstructed at run-time. In addition, packers can be metamorphic, meaning that the output of the packer will never be exactly the same, even if the same file is packed again. As the use of known off-the-shelf malware packers is declining, it is becoming increasingly more important to implement methods of detecting packed executables without having any known samples of a given packer. In this study, we evaluate the use of recurrent neural networks as a means to classify whether or not a file is packed by a metamorphic packer. We show that even with quite simple networks, it is possible to correctly distinguish packed executables from …
Total citations
20212022202320242435
Scholar articles
E Bergenholtz, E Casalicchio, D Ilie, A Moss - … Security: 22nd International Conference, ICICS 2020 …, 2020