ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)
Cited 28 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
저자
최양서, 김익균, 오진태, 류재철
발행일
200810
출처
International Symposium on Computer Science and its Applications (CSA) 2008, pp.28-31
DOI
https://dx.doi.org/10.1109/CSA.2008.28
협약과제
08MS2100, Network 위협의 Zero-Day Attack 대응을 위한 실시간 공격 Signature 생성 및 관리 기술개발, 장종수
초록
In order to conceal malware, malware authors use the packing and encryption techniques. If the malware is packed or encrypted, then it is very difficult to analyze. Therefore, to prevent the harmful effects of malware and to generate signatures for malware detection, the packed and encrypted executable codes must initially be unpacked. The first step of unpacking is to detect the packed executable files. In this paper, a packed file detection technique (PHAD) based on a PE Header Analysis is proposed. In many cases, to pack and unpack the executable codes, PE files have unusual attributes in their PE headers. In this paper, these characteristics are utilized to detect the packed files. A Characteristic Vector (CV) that consists of eight elements is defined, and the Euclidean distance (ED) of the CV is calculated. The EDs of the packed files are calculated and represent the base threshold for the detection of packed files. © 2008 IEEE.
KSP 제안 키워드
Characteristic vector, Encryption technique, File detection, Malware detection, PE file header, detection techniques, euclidean distance