.kogl_cc_info .cc_img_box { background: url(/ksp/resources/ksp/img/background/kogl_type4_en.jpg) no-repeat; } body { min-width: 1200px; } .list_tbl .abstracts { width: 700px; overflow: hidden; white-space: nowrap; text-overflow:ellipsis; color: #666; margin-top: 3px; }

ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Encoded Executable File Detection Technique Via Executable File Header Analysis
Cited - time in scopus Share share facebook twitter linkedin kakaostory
Authors
Yang Seo Choi, Ik kyun Kim, Jin Tae Oh, Jae Cheol Ryou
Issue Date
2009-04
Citation
International Journal of Hybrid Information Technology, v.2, no.2, pp.25-36
ISSN
1738-9968
Publisher
SERSC
Language
English
Type
Journal Article
Abstract
Recently, the attack trends have been changed from fast and widespread malware propagation attacks to more sophisticated "targeted" attacks such as spy/adware, password stealers, ransom-ware, and botenets etc. and the attacks are tried via the automated malwares. In this situation, the malware is the most powerful weapon for the attackers. So, the attackers do not want their malwares to be reviled by anti-virus analyzer. In order to conceal their malware, malware programmers are getting utilize the anti reverse engineering techniques and code changing techniques such as the packing, encoding and encryption techniques. If the malware is packed or encrypted, then it is very difficult to analyze. Therefore, to prevent the harmful effects of malware and to generate signatures for malware detection, the packed and encrypted executable codes must initially be unpacked. The first step of unpacking is to detect the packed executable files. In this paper, a packed file detection technique based on a PE Header Analysis is proposed. In many cases, to pack and unpack the executable codes, PE files have unusual attributes in their PE headers. In this paper, these characteristics are utilized to detect the packed files. A Characteristic Vector (CV) that consists of eight elements is defined, and the Euclidean distance (ED) of the CV is calculated. The EDs of the packed files are calculated and represent the base threshold for the detection of packed files.
KSP Keywords
Characteristic vector, Encryption technique, Executable file, File detection, Malware detection, Malware propagation, PE files, Reverse Engineering, anti-virus, detection techniques, euclidean distance