Articles producció científicaEnginyeria Informàtica i Matemàtiques

Beyond the sandbox: Leveraging symbolic execution for evasive malware classification

  • Datos identificativos

    Identificador:  imarina:9392096
    Autores:  Vouvoutsis, Vasilis; Casino, Fran; Patsakis, Constantinos
    Resumen:
    Threat actors continuously update their code to incorporate counter-analysis techniques designed to evade detection and hinder the blocking of their malware. The first line of defence for malware authors is often to bypass static analysis, a relatively straightforward task using readily available tools such as packers and cryptors. To address this shortcoming, defenders send potential malware samples for execution in a sandbox environment. While sandboxing can provide valuable insights into the behaviour of software on an information system, advanced techniques like anti-virtualisation and hooking evasion allow malware to escape detection. The primary objective of this work is to complement sandbox execution with symbolic execution frameworks to detect new malware strains efficiently. Symbolic execution offers a distinct advantage over sandboxing by achieving greater coverage of all possible execution traces, as it can explore every potential execution path, regardless of the evasion methods employed by the malware authors. By carefully selecting the samples to be analysed, we can significantly reduce the workload while extracting essential dynamic features in a fraction of the time and with far fewer computational resources compared to sandboxing. To this end, we leverage machine learning in an automated pipeline, enabling the accurate detection of sophisticated malware using a real-world dataset. Our approach yields average F1 scores of 0.93 for the benign class and 0.99 for the malware class in a binary classification setup, surpassing the detection rates reported in the literature. Additionally, our method outperforms a commercial malware sandbox when applied to the same dataset, further highlighting the efficacy of the proposed method.
  • Otros:

    Enlace a la fuente original: https://www.sciencedirect.com/science/article/pii/S016740482400498X?via%3Dihub
    Referencia de l'ítem segons les normes APA: Vouvoutsis, Vasilis; Casino, Fran; Patsakis, Constantinos (2025). Beyond the sandbox: Leveraging symbolic execution for evasive malware classification. COMPUTERS & SECURITY, 149(0), 104193-. DOI: 10.1016/j.cose.2024.104193
    Referencia al articulo segun fuente origial: COMPUTERS & SECURITY. 149 (0): 104193-
    DOI del artículo: 10.1016/j.cose.2024.104193
    Año de publicación de la revista: 2025-01-01
    Entidad: Universitat Rovira i Virgili
    Versión del articulo depositado: info:eu-repo/semantics/publishedVersion
    Fecha de alta del registro: 2026-04-11
    Autor/es de la URV: Casino Cembellín, Francisco José
    Departamento: Enginyeria Informàtica i Matemàtiques
    URL Documento de licencia: https://repositori.urv.cat/ca/proteccio-de-dades/
    Tipo de publicación: Journal Publications
    Autor según el artículo: Vouvoutsis, Vasilis; Casino, Fran; Patsakis, Constantinos
    Acceso a la licencia de uso: https://creativecommons.org/licenses/by/3.0/es/
    Áreas temáticas: Law, General computer science, Engenharias iv, Computer science, information systems, Computer science (miscellaneous), Computer science (all), Ciencias sociales, Ciências agrárias i, Ciência da computação, Administração pública e de empresas, ciências contábeis e turismo
    Direcció de correo del autor: franciscojose.casino@urv.cat
  • Palabras clave:

    Trends
    Symbolic execution
    State
    Malware classification
    Malware
    Machine learning
    Clustering
    Computer Science (Miscellaneous)
    Computer Science
    Information Systems
    Law
    General computer science
    Engenharias iv
    Computer science (all)
    Ciencias sociales
    Ciências agrárias i
    Ciência da computação
    Administração pública e de empresas
    ciências contábeis e turismo
  • Documentos:

  • Cerca a google

    Search to google scholar