Change search
Link to record
Permanent link

Direct link
Publications (2 of 2) Show all publications
Bergenholtz, E., Casalicchio, E., Ilie, D. & Moss, A. (2020). Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks. In: Weizhi Meng, Dieter Gollmann, Christian D. Jensen, and Jianying Zhou (Ed.), Lecture Notes in Computer Science: . Paper presented at 22nd International Conference on Information and Communications Security, ICICS 2020; Online, Copenhagen; Denmark; 24 August 2020 through 26 August 2020 (pp. 36-53). Springer Science and Business Media Deutschland GmbH, 12282
Open this publication in new window or tab >>Detection of Metamorphic Malware Packers Using Multilayered LSTM Networks
2020 (English)In: Lecture Notes in Computer Science / [ed] Weizhi Meng, Dieter Gollmann, Christian D. Jensen, and Jianying Zhou, Springer Science and Business Media Deutschland GmbH , 2020, Vol. 12282, p. 36-53Conference paper, Published paper (Refereed)
Abstract [en]

Malware authors do their best to conceal their malicious software to increase its probability of spreading and to slow down analysis. One method used to conceal malware is packing, in which the original malware is completely hidden through compression or encryption, only to be reconstructed at run-time. In addition, packers can be metamorphic, meaning that the output of the packer will never be exactly the same, even if the same file is packed again. As the use of known off-the-shelf malware packers is declining, it is becoming increasingly more important to implement methods of detecting packed executables without having any known samples of a given packer. In this study, we evaluate the use of recurrent neural networks as a means to classify whether or not a file is packed by a metamorphic packer. We show that even with quite simple networks, it is possible to correctly distinguish packed executables from non-packed executables with an accuracy of up to 89.36% when trained on a single packer, even for samples packed by previously unseen packers. Training the network on more packer raises this number to up to 99.69%.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH, 2020
Series
Lecture Notes in Computer Science, ISSN 0302-9743
Keywords
packing, packer detection, security, static analysis, machine learning, deep learning
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-20107 (URN)10.1007/978-3-030-61078-4_3 (DOI)2-s2.0-85097650138 (Scopus ID)9783030610777 (ISBN)
Conference
22nd International Conference on Information and Communications Security, ICICS 2020; Online, Copenhagen; Denmark; 24 August 2020 through 26 August 2020
Note

open access 

Available from: 2020-11-29 Created: 2020-11-29 Last updated: 2025-09-30Bibliographically approved
Bergenholtz, E., Moss, A., Ilie, D. & Casalicchio, E. (2019). Finding a needle in a haystack: A comparative study of IPv6 scanning methods. In: 2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019): . Paper presented at 6th IEEE Int. Symposium on Networks, Computer and Communication, , 18-20 June, Istanbul. IEEE
Open this publication in new window or tab >>Finding a needle in a haystack: A comparative study of IPv6 scanning methods
2019 (English)In: 2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), IEEE, 2019Conference paper, Published paper (Refereed)
Abstract [en]

It has previously been assumed that the size of anIPv6 network would make it impossible to scan the network forvulnerable hosts. Recent work has shown this to be false, andseveral methods for scanning IPv6 networks have been suggested.However, most of these are based on external information likeDNS, or pattern inference which requires large amounts of knownIP addresses. In this paper, DeHCP, a novel approach based ondelimiting IP ranges with closely clustered hosts, is presentedand compared to three previously known scanning methods. Themethod is shown to work in an experimental setting with resultscomparable to that of the previously suggested methods, and isalso shown to have the advantage of not being limited to a specificprotocol or probing method. Finally we show that the scan canbe executed across multiple VLANs.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
ipv6, ipv6 scanning, cyber scanning, host discovery, penetration testing
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-18901 (URN)10.1109/ISNCC.2019.8909131 (DOI)000520478600045 ()9781728112435 (ISBN)
Conference
6th IEEE Int. Symposium on Networks, Computer and Communication, , 18-20 June, Istanbul
Note

open access

Available from: 2019-11-12 Created: 2019-11-12 Last updated: 2025-09-30Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-2015-9185

Search in DiVA

Show all publications