Tutorial: An Overview of Malware Detection and Evasion Techniques

Fabrizio Biondi,Thomas Given-Wilson,Axel Legay,Cassius Puodzius,Jean Quilbeuf
DOI: https://doi.org/10.1007/978-3-030-03418-4_34
2018-01-01
Abstract:This tutorial presents and motivates various malware detection tools and illustrates their usage on a clear example. We demonstrate how statically-extracted syntactic signatures can be used for quickly detecting simple variants of malware. Since such signatures can easily be obfuscated, we also present dynamically-extracted behavioral signatures which are obtained by running the malware in an isolated environment known as a sandbox. However, some malware can use sandbox detection to detect that they run in such an environment and so avoid exhibiting their malicious behavior. To counteract sandbox detection, we present concolic execution that can explore several paths of a binary. We conclude by showing how opaque predicates and JIT can be used to hinder concolic execution.
What problem does this paper attempt to address?