Skip to main content

Challenging Anti-virus Through Evolutionary Malware Obfuscation

  • Conference paper
  • First Online:
Applications of Evolutionary Computation (EvoApplications 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9598))

Included in the following conference series:

Abstract

The use of anti-virus software has become something of an act of faith. A recent study showed that more than 80 % of all personal computers have anti-virus software installed. However, the protection mechanisms in place are far less effective than users would expect. Malware analysis is a classical example of cat-and-mouse game: as new anti-virus techniques are developed, malware authors respond with new ones to thwart analysis. Every day, anti-virus companies analyze thousands of malware that has been collected through honeypots, hence they restrict the research to only already existing viruses. This article describes a novel method for malware obfuscation based an evolutionary opcode generator and a special ad-hoc packer. The results can be used by the security industry to test the ability of their system to react to malware mutations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Note: test have been executed on Windows 7, by default ASLR is enabled.

  2. 2.

    https://msdn.microsoft.com/en-us/library/windows/desktop/ms686708(v=vs.85).aspx.

  3. 3.

    https://msdn.microsoft.com/en-us/library/windows/desktop/aa813706(v=vs.85).aspx.

  4. 4.

    http://blog.rewolf.pl/blog/.

  5. 5.

    https://www.metascan-online.com/.

  6. 6.

    https://www.virustotal.com.

  7. 7.

    https://virusscan.jotti.org.

References

  1. Michael, S., Andrew, H.: Practical Malware Analysis - The Hands-On Guide to Dissecting Malicious Software. No Starch Press, San Francisco (2012)

    Google Scholar 

  2. Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6(1), 22–35 (1987)

    Article  Google Scholar 

  3. Von Neumann, J., Burks, A.W., et al.: Theory of self-reproducing automata. IEEE Trans. Neural Netw. 5(1), 3–14 (1966)

    Google Scholar 

  4. Chen, T.M., Robert, J.-M.: The evolution of viruses, worms. In: Statistical Methods in Computer Security, vol. 1 (2004)

    Google Scholar 

  5. Szor, P.: The art of computer virus research and defense. Pearson Education, Indianapolis (2005)

    Google Scholar 

  6. Yason, M.V.: The art of unpacking, Chicago (2007). Retrieved 12 February 2008

    Google Scholar 

  7. Guo, F., Ferrie, P., Chiueh, T.: A study of the packer problem and its solutions. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 98–115. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Cani, A., Gaudesi, M., Sanchez, E., Squillero, G., Tonda, A.: Towards automated malware creation: code generation and code integration. In Proceedings of the 29th Annual ACM Symposium on Applied Computing pp. 157–160. ACM, March 2014

    Google Scholar 

  9. Gaudesi, M., Marcelli, A., Sanchez, E., Squillero, G., Tonda, A.: Malware obfuscation through evolutionary packers. In: Proceedings of the Companion Publication of the 2015 on Genetic and Evolutionary Computation Conference, pp. 757–758. ACM, July 2015

    Google Scholar 

  10. Noreen, S., Murtaza, S., Shafiq, M.Z., Farooq, M.: Evolvable malware. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, pp. 1569–1576. ACM, July 2009

    Google Scholar 

  11. Kayack, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Appl. Soft Comput. 11(7), 4366–4383 (2011)

    Article  Google Scholar 

  12. Iliopoulos, D., Adami, C., Szor, P.: malware evolution and the consequences for computer security. arXiv preprint arxiv:1111.2503.Chicago

  13. Szr, P., Ferrie, P.: Hunting for metamorphic. In: Virus Bulletin Conference, September 2001

    Google Scholar 

  14. Nachenberg, C.: Computer virus-coevolution. Commun. ACM 50(1), 46–51 (1997)

    Article  Google Scholar 

  15. Perriot, F., Ferrie, P., Szor, P.: Striking similarities. Virus Bull., 4–6 (2002)

    Google Scholar 

  16. Desai, P.: Towards an undetectable computer virus (Doctoral dissertation, San Jose State University), Chicago (2008)

    Google Scholar 

  17. Xue, F.: Attacking antivirus. In: Black Hat Europe Conference (2008)

    Google Scholar 

  18. Microsoft Security Intelligence Report, vol. 18, December 2014

    Google Scholar 

  19. Ferrie, P., Szor, P.: Zmist opportunities. Virus Bull. 3(2001), 6–7 (2001)

    Google Scholar 

  20. Peering Inside the PE: A Tour of the Win32 Portable Executable File Format. https://msdn.microsoft.com/en-us/library/ms809762.aspx

Download references

Acknowledgments

A special thank to Peter Ferrie, principal anti-virus researcher at Microsoft, for answering the questions as well as his comments and feedback on latest malware obfuscation technologies.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrea Marcelli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Gaudesi, M., Marcelli, A., Sanchez, E., Squillero, G., Tonda, A. (2016). Challenging Anti-virus Through Evolutionary Malware Obfuscation. In: Squillero, G., Burelli, P. (eds) Applications of Evolutionary Computation. EvoApplications 2016. Lecture Notes in Computer Science(), vol 9598. Springer, Cham. https://doi.org/10.1007/978-3-319-31153-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31153-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31152-4

  • Online ISBN: 978-3-319-31153-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics