Detecting Packed Executables using Steganalysis

Colin Burgess, Fatih Kurugollu, Sakir Sezer, Keiran McLaughlin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

This paper proposes a novel method of detecting packed executable files using steganalysis, primarily targeting the detection of obfuscated malware through packing. Considering that over 80% of malware in the wild is packed, detection accuracy and low false negative rates are important properties of malware detection methods. Experimental results outlined in this paper reveal that the proposed approach achieving an overall detection accuracy of greater than 99%, a false negative rate of 1% and a false positive rate of 0%.
Original languageEnglish
Title of host publication5th European Workshop on Visual Information Processing (EUVIP)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages101-105
Number of pages5
ISBN (Electronic)978-1-4799-4572-6
ISBN (Print)9781479945719
DOIs
Publication statusPublished - Dec 2014
Event5th European Workshop on Visual Information Processing, EUVIP 2014 - Paris, France
Duration: 10 Dec 201412 Dec 2014

Conference

Conference5th European Workshop on Visual Information Processing, EUVIP 2014
CountryFrance
CityParis
Period10/12/201412/12/2014

Fingerprint Dive into the research topics of 'Detecting Packed Executables using Steganalysis'. Together they form a unique fingerprint.

  • Cite this

    Burgess, C., Kurugollu, F., Sezer, S., & McLaughlin, K. (2014). Detecting Packed Executables using Steganalysis. In 5th European Workshop on Visual Information Processing (EUVIP) (pp. 101-105). Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/EUVIP.2014.7018361