Articles producció científicaEnginyeria Informàtica i Matemàtiques

Beyond the sandbox: Leveraging symbolic execution for evasive malware classification

  • Dades identificatives

    Identificador:  imarina:9392096
    Autors:  Vouvoutsis, Vasilis; Casino, Fran; Patsakis, Constantinos
    Resum:
    Threat actors continuously update their code to incorporate counter-analysis techniques designed to evade detection and hinder the blocking of their malware. The first line of defence for malware authors is often to bypass static analysis, a relatively straightforward task using readily available tools such as packers and cryptors. To address this shortcoming, defenders send potential malware samples for execution in a sandbox environment. While sandboxing can provide valuable insights into the behaviour of software on an information system, advanced techniques like anti-virtualisation and hooking evasion allow malware to escape detection. The primary objective of this work is to complement sandbox execution with symbolic execution frameworks to detect new malware strains efficiently. Symbolic execution offers a distinct advantage over sandboxing by achieving greater coverage of all possible execution traces, as it can explore every potential execution path, regardless of the evasion methods employed by the malware authors. By carefully selecting the samples to be analysed, we can significantly reduce the workload while extracting essential dynamic features in a fraction of the time and with far fewer computational resources compared to sandboxing. To this end, we leverage machine learning in an automated pipeline, enabling the accurate detection of sophisticated malware using a real-world dataset. Our approach yields average F1 scores of 0.93 for the benign class and 0.99 for the malware class in a binary classification setup, surpassing the detection rates reported in the literature. Additionally, our method outperforms a commercial malware sandbox when applied to the same dataset, further highlighting the efficacy of the proposed method.
  • Altres:

    Enllaç font original: https://www.sciencedirect.com/science/article/pii/S016740482400498X?via%3Dihub
    Referència de l'ítem segons les normes APA: Vouvoutsis, Vasilis; Casino, Fran; Patsakis, Constantinos (2025). Beyond the sandbox: Leveraging symbolic execution for evasive malware classification. COMPUTERS & SECURITY, 149(0), 104193-. DOI: 10.1016/j.cose.2024.104193
    Referència a l'article segons font original: COMPUTERS & SECURITY. 149 (0): 104193-
    DOI de l'article: 10.1016/j.cose.2024.104193
    Any de publicació de la revista: 2025-01-01
    Entitat: Universitat Rovira i Virgili
    Versió de l'article dipositat: info:eu-repo/semantics/publishedVersion
    Data d'alta del registre: 2026-04-11
    Autor/s de la URV: Casino Cembellín, Francisco José
    Departament: Enginyeria Informàtica i Matemàtiques
    URL Document de llicència: https://repositori.urv.cat/ca/proteccio-de-dades/
    Tipus de publicació: Journal Publications
    Autor segons l'article: Vouvoutsis, Vasilis; Casino, Fran; Patsakis, Constantinos
    Accès a la llicència d'ús: https://creativecommons.org/licenses/by/3.0/es/
    Àrees temàtiques: Law, General computer science, Engenharias iv, Computer science, information systems, Computer science (miscellaneous), Computer science (all), Ciencias sociales, Ciências agrárias i, Ciência da computação, Administração pública e de empresas, ciências contábeis e turismo
    Adreça de correu electrònic de l'autor: franciscojose.casino@urv.cat
  • Paraules clau:

    Trends
    Symbolic execution
    State
    Malware classification
    Malware
    Machine learning
    Clustering
    Computer Science (Miscellaneous)
    Computer Science
    Information Systems
    Law
    General computer science
    Engenharias iv
    Computer science (all)
    Ciencias sociales
    Ciências agrárias i
    Ciência da computação
    Administração pública e de empresas
    ciências contábeis e turismo
  • Documents:

  • Cerca a google

    Search to google scholar