Malware Obfuscation Techniques: A Brief Survey

As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores the malware obfuscation techniques while reviewing the encrypted, oligomorphic, polymorphic and metamorphic malwares which are able to avoid detection. Moreover, we discuss the future trends on the malware obfuscation techniques.

[1]  P. Constantinou,et al.  Interference and compatibility issues between the mobile satellite service and the fixed service in the Ku band , 2004, 2004 IEEE 59th Vehicular Technology Conference. VTC 2004-Spring (IEEE Cat. No.04CH37514).

[2]  Mark Stamp,et al.  Hunting for metamorphic engines , 2006, Journal in Computer Virology.

[3]  David M. Pozar,et al.  Anomalous mutual coupling between microstrip antennas , 1994 .

[4]  R. Waterhouse,et al.  Design of wide-band aperture-stacked patch microstrip antennas , 1998 .

[5]  Mikko Hypponen,et al.  Malware goes mobile. , 2006, Scientific American.

[6]  Jean-Francois Zurcher The SSFIP: a global concept for high-performance broadband planar antennas , 1988 .

[7]  Eunjin Jung,et al.  Obfuscated malicious javascript detection using classification techniques , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[8]  R. J. Mailloux,et al.  Antenna array architecture , 1992, Proc. IEEE.

[9]  Arini Balakrishnan,et al.  Code Obfuscation Literature Survey , 2005 .

[10]  Heng Yin,et al.  Renovo: a hidden code extractor for packed executables , 2007, WORM '07.

[11]  Somesh Jha,et al.  Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.

[12]  Sahin Albayrak,et al.  Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[13]  Evgenios Konstantinou,et al.  Metamorphic Virus: Analysis and Detection , 2008 .

[14]  Ludovic Mé,et al.  Are current antivirus programs able to detect complex metamorphic malware? An empirical evaluation. , 2009 .