Articles producció científicaEnginyeria Informàtica i Matemàtiques

On the effectiveness of binary emulation in malware classification

  • Identification data

    Identifier:  imarina:9271519
    Authors:  Vouvoutsis V; Casino F; Patsakis C
    Abstract:
    Malware authors continuously evolve their code base to include counter-analysis methods that can significantly hinder their detection and blocking. While malware execution in a sandboxed environment may provide insightful feedback about what the malware does in a machine, anti-virtualisation and hooking evasion methods may allow malware to bypass such detection methods. The main objective of this work is to complement sandbox execution with the use of binary emulation frameworks. The core idea is to exploit the fact that binary emulation frameworks may test samples quicker than a sandbox environment as they do not need to open a whole new virtual machine to execute the binary. While with this approach we lose the granularity of the data collected through a sandbox, one may only need to efficiently determine whether a file is malicious or to which malware family it belongs. To this end, we record the performed API calls and use them to explore the efficacy of using them as features for binary and multiclass classification. Our extensive experiments with real-world malware illustrate that this approach is very accurate, achieving state-of-the art outcomes with a statistically robust set of classification experiments while simultaneously having a relatively low computational overhead compared to traditional sandbox approaches. In fact, we compare the binary analysis results with a commercial sandbox, and our classification outperforms it at the expense of the fine-grained results that a sandbox provides.
  • Others:

    Link to the original source: https://www.sciencedirect.com/science/article/pii/S2214212622001223?via%3Dihub
    APA: Vouvoutsis V; Casino F; Patsakis C (2022). On the effectiveness of binary emulation in malware classification. Journal Of Information Security And Applications, 68(), -. DOI: 10.1016/j.jisa.2022.103258
    Paper original source: Journal Of Information Security And Applications. 68
    Article's DOI: 10.1016/j.jisa.2022.103258
    Journal publication year: 2022
    Entity: Universitat Rovira i Virgili
    Paper version: info:eu-repo/semantics/submittedVersion
    Record's date: 2024-10-12
    URV's Author/s: Casino Cembellín, Francisco José
    Department: Enginyeria Informàtica i Matemàtiques
    Licence document URL: https://repositori.urv.cat/ca/proteccio-de-dades/
    Publication Type: Journal Publications
    Author, as appears in the article.: Vouvoutsis V; Casino F; Patsakis C
    licence for use: https://creativecommons.org/licenses/by/3.0/es/
    Thematic Areas: Software, Safety, risk, reliability and quality, Computer science, information systems, Computer networks and communications
    Author's mail: franciscojose.casino@urv.cat
  • Keywords:

    Malware
    Machine learning
    Classification
    Binary emulation
    Computer Networks and Communications
    Computer Science
    Information Systems
    Safety
    Risk
    Reliability and Quality
    Software
  • Documents:

  • Cerca a google

    Search to google scholar