Opcodes histogram for classifying metamorphic portable executables malware

Malware writers attempt to generate different shapes of a malware to evade the signature-based scanners. As the number of variants of a metamorphic malware is increased, the analysis of all variants and selecting the appropriate signature and updating the database of the antivirus becomes more tires...

Full description

Saved in:
Bibliographic Details
Main Authors: Masrom, Maslin, Ibrahim, Suahimi
Format: Conference or Workshop Item
Published: 2012
Subjects:
Online Access:http://eprints.utm.my/34159/
http://eprints.utm.my/34159/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Malware writers attempt to generate different shapes of a malware to evade the signature-based scanners. As the number of variants of a metamorphic malware is increased, the analysis of all variants and selecting the appropriate signature and updating the database of the antivirus becomes more tiresome and time-consuming. Furthermore, for automated generated metamorphic viruses, which utilize the virus kits to produce different instances, sometime it is not possible to analyze all of them. Therefore, use of some classification methods to speed up the analysis process is necessary. In this paper, we show that how the histogram of instructions opcodes can help us in classification of metamorphic virus family variants.