SPADE: Signature based PAcker DEtection

  • Authors:
  • Smita Naval;Vijay Laxmi;M. S. Gaur;P. Vinod

  • Affiliations:
  • Malaviya National Institute of Technology, Jaipur, Rajasthan;Malaviya National Institute of Technology, Jaipur, Rajasthan;Malaviya National Institute of Technology, Jaipur, Rajasthan;Malaviya National Institute of Technology, Jaipur, Rajasthan

  • Venue:
  • Proceedings of the First International Conference on Security of Internet of Things
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malware is a powerful weapon to hamper various confidential and secure data of a personal computer. Code packing helps the malware authors to create new variants of existing malwares and thus signature based malware detection is defeated. Packing tools hinder the reverse engineering process and hence it is difficult for security researchers to perform analysis of new or unknown malware. Dynamic unpacker requires dedicated hardware and software for analyzing samples and it is computationally expensive. Hence a fast method is required for analysing packers used to create packed executable. Every packer uses its own unpacking algorithm to unpack the payload in memory, so if apriori information on packer used is available, the unpacking becomes easy. In this paper, we have proposed a novel technique for generating the signature of packed malware to identify the packer used for obfuscating the binary.