PEAL--Packed executable analysis

  • Authors:
  • Vijay Laxmi;Manoj Singh Gaur;Parvez Faruki;Smita Naval

  • Affiliations:
  • Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, India;Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, India;Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, India;Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, India

  • Venue:
  • ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The proliferation of packed malware has posed a serious threat to computers connected to Internet across the globe. Packers are popular tools used by malware authors to hide malicious payloads that bypass traditional signature antiviruses (AV). Packing being the easiest way to defeat signature based detection, unpacking of samples is important. As unpacking is a time consuming pro- cess, it reduces overall efficiency of AV scanner. Unpacking is a compulsory step in malware analysis, else it would increase the rate of false alarms and misses. In this paper we propose PEAL, a pre---processing phase to identify packed executables from a set of packed and native files. Our method reduces overall execution time of AV by filtering packed samples from non-packed. Experimental results show that the proposed method is capable of identifying packed and native executables with high accuracy.