亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整地填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack

逃避(道德) 恶意软件 计算机科学 计算机安全 隐病毒学 混淆 网络空间 过程(计算) 隐蔽的 数据科学 互联网 万维网 语言学 生物 操作系统 哲学 免疫学 免疫系统
作者
Jiaxuan Geng,Junfeng Wang,Zhiyang Fang,Yingjie Zhou,Di Wu,Wenhan Ge
出处
期刊:Computers & Security [Elsevier BV]
卷期号:137: 103595-103595 被引量:16
标识
DOI:10.1016/j.cose.2023.103595
摘要

The continuous proliferation of malware poses a formidable threat to the cyberspace landscape. Researchers have proffered a multitude of sophisticated defense mechanisms aimed at its detection and mitigation. Nevertheless, malware writers persistently pursue pioneering and innovative methods to evade detection by security software, thereby presenting an ever-evolving and dynamic threat to computer systems. Malware evasion refers to the use of certain strategies by malware to evade the detection of security software. Despite numerous surveys on malware evasion techniques, the existing surveys were fragmented and focused on specific types of evasion methods, leading to a lack of systematic and comprehensive research on malware evasion approaches. To fill this gap, this paper proposed a strategy-driven framework from the perspective of malware writers. Based on this framework, we categorize existing evasion detection techniques into transformation (alter the structural and behavioral pattern of the malware), concealment (conceal the behavior of the malware), and attack-based (engage in an attack on the detector to render it inoperable) methods and conduct a comprehensive survey of the relevant research works. In addition, we demonstrate how to integrate existing evasion strategies in the process of generating malware from the perspective of malware writers to subvert the multiple defenses of defenders. Our investigation indicates that: 1) evasion techniques such as packer and code obfuscation remain the foremost selection for attackers, no fewer than 10 off-the-shelf tools provide great assistance to them, 2) environment analysis is the primary concealment-based strategy used by the attacker (48% of the reviewed concealment-based strategy), defenders need greater efforts to counter them, 3) only 3 works discussed techniques for evasion attacks by leveraging fragilities in antivirus engines, meaning that direct attack on the detector is no longer as effective, 4) reinforcement learning algorithm serves as the most popular adversarial attack-based methods and 50% of works based on reinforcement learning are effective against real-world antivirus engines. Furthermore, this paper delves into the development trends in evasive malware and open issues for defenders. The primary objective of this survey is to furnish researchers and practitioners with a thorough comprehension of malware evasion strategies and techniques, thereby fostering the advancement of more potent and efficient approaches to detect and thwart malware.

科研通智能强力驱动
Strongly Powered by AbleSci AI
科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
斯文梦寒完成签到 ,获得积分10
1秒前
3秒前
7秒前
风华正茂完成签到,获得积分10
15秒前
guagua发布了新的文献求助30
17秒前
22秒前
old幽露露完成签到 ,获得积分10
24秒前
洛洛薇完成签到 ,获得积分10
24秒前
wf发布了新的文献求助10
27秒前
沉默的香氛完成签到,获得积分10
29秒前
万能图书馆应助喵小薇采纳,获得10
29秒前
29秒前
Duan完成签到 ,获得积分10
30秒前
Diamond完成签到 ,获得积分10
32秒前
34秒前
咎不可完成签到,获得积分10
34秒前
34秒前
guagua完成签到,获得积分10
36秒前
40秒前
Alexa应助Amutou采纳,获得10
42秒前
纳若w应助luli采纳,获得20
47秒前
49秒前
小河豚发布了新的文献求助10
53秒前
思源应助一只采纳,获得10
53秒前
纳若w应助luli采纳,获得10
55秒前
57秒前
纳若w应助luli采纳,获得10
1分钟前
ray发布了新的文献求助10
1分钟前
CipherSage应助周龙采纳,获得10
1分钟前
FashionBoy应助科研通管家采纳,获得10
1分钟前
完美世界应助科研通管家采纳,获得10
1分钟前
在水一方应助科研通管家采纳,获得10
1分钟前
无极微光应助科研通管家采纳,获得20
1分钟前
bkagyin应助科研通管家采纳,获得10
1分钟前
彭于晏应助科研通管家采纳,获得10
1分钟前
1分钟前
衣架完成签到 ,获得积分10
1分钟前
betyby完成签到 ,获得积分10
1分钟前
zoe完成签到 ,获得积分10
1分钟前
ray完成签到,获得积分10
1分钟前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Applied Min-Max Approach to Missile Guidance and Control 5000
Metallurgy at high pressures and high temperatures 2000
Inorganic Chemistry Eighth Edition 1200
Anionic polymerization of acenaphthylene: identification of impurity species formed as by-products 1000
The Psychological Quest for Meaning 800
Signals, Systems, and Signal Processing 610
热门求助领域 (近24小时)
化学 材料科学 医学 生物 纳米技术 工程类 有机化学 化学工程 生物化学 计算机科学 物理 内科学 复合材料 催化作用 物理化学 光电子学 电极 细胞生物学 基因 无机化学
热门帖子
关注 科研通微信公众号,转发送积分 6325704
求助须知:如何正确求助?哪些是违规求助? 8141863
关于积分的说明 17071051
捐赠科研通 5378177
什么是DOI,文献DOI怎么找? 2854121
邀请新用户注册赠送积分活动 1831755
关于科研通互助平台的介绍 1682858