We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Dissecting Malware in the Wild

Abstract: With the increasingly rapid development of new malicious computer software by bad faith actors, both commercial and research-oriented antivirus detectors have come to make greater use of machine learning tactics to identify such malware as harmful before end users are exposed to their effects. This, in turn, has spurred the development of tools that allow for known malware to be manipulated such that they can evade being classified as dangerous by these machine learning-based detectors, while retaining their malicious functionality. These manipulations function by applying a set of changes that can be made to Windows programs that result in a different file structure and signature without altering the software's capabilities. Various proposals have been made for the most effective way of applying these alterations to input malware to deceive static malware detectors; the purpose of this research is to examine these proposals and test their implementations to determine which tactics tend to generate the most successful attacks.
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:2111.14035 [cs.CR]
  (or arXiv:2111.14035v2 [cs.CR] for this version)

Submission history

From: Ruoxi Sun [view email]
[v1] Sun, 28 Nov 2021 03:14:52 GMT (634kb,D)
[v2] Sat, 4 Dec 2021 05:59:26 GMT (634kb,D)

Link back to: arXiv, form interface, contact.