Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4659
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHubballi, Neminathen_US
dc.contributor.authorDogra, Himanshuen_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:05Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:05Z-
dc.date.issued2016-
dc.identifier.citationHubballi, N., & Dogra, H. (2016). Detecting packed executable file: Supervised or anomaly detection method? Paper presented at the Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016, 638-643. doi:10.1109/ARES.2016.18en_US
dc.identifier.isbn9781509009909-
dc.identifier.otherEID(2-s2.0-85015302049)-
dc.identifier.urihttps://doi.org/10.1109/ARES.2016.18-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4659-
dc.description.abstractExecutable packing is an evasion technique used to propagate malware in the wild. Packing uses compression and/or encryption to thwart static analysis. There are universal unpackers available which can extract original binary from any type of packer, however they are computationally expensive as they are based on dynamic analysis which requires malware execution. A possible approach is to use machine learning techniques for classifying whether an executable is packed or not packed. Although supervised machine learning methods are good at learning packer specific features, these require collecting data from each packer and extracting features specific to it which may not be feasible practically. In this paper we propose a semi-supervised technique and an anomaly based detection method to identify packed executable files. We measure the distance between representative generated from a packed and non-packed binary training data and estimate the class based on its nearest distance in semi-supervised method. In anomaly detection we generate a representative cluster from known non-packed samples and find the radius of cluster and compare the distance of a test executable with that of radius to decide either it as normal or packed one. We experiment with few distance measures and report detection performance of these methods on two datasets. © 2016 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceProceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016en_US
dc.subjectArtificial intelligenceen_US
dc.subjectBinsen_US
dc.subjectComputer crimeen_US
dc.subjectCryptographyen_US
dc.subjectMalwareen_US
dc.subjectPackersen_US
dc.subjectSignal detectionen_US
dc.subjectStatic analysisen_US
dc.subjectSupervised learningen_US
dc.subjectAnomaly based detectionen_US
dc.subjectAnomaly detectionen_US
dc.subjectAnomaly detection methodsen_US
dc.subjectDetection performanceen_US
dc.subjectExtracting featuresen_US
dc.subjectMachine learning techniquesen_US
dc.subjectSemi-supervised methoden_US
dc.subjectSupervised machine learningen_US
dc.subjectLearning systemsen_US
dc.titleDetecting packed executable file: Supervised or anomaly detection method?en_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: