DocumentCode :
2169680
Title :
Malware Analysis with Multiple Features
Author :
Zabidi, Muhammad Najmi Ahmad ; Maarof, Mohd Aizaini ; Zainal, Anazida
Author_Institution :
Kulliyyah of Inf. & Commun. Technol., Int. Islamic Univ. Malaysia, Kuala Lumpur, Malaysia
fYear :
2012
fDate :
28-30 March 2012
Firstpage :
231
Lastpage :
235
Abstract :
Malware analysis process is being categorized into static analysis and dynamic analysis. Both static and dynamic analysis have their own strengths and weaknesses. In this paper, we present a tool written in Python programming language called as pingaji, which could assist the work of malware analyst to get the static features of malware. pingaji contains several modules - Application Programming Interface (API) calls extractor, binary entropy information, anti virtual machine and anti debugger detector and XOR encrypted strings decrypt or. pingaji was developed in order to assist our work in getting malware features. pingaji is focusing on ripping Microsoft Windows executable binaries´ malicious features.
Keywords :
application program interfaces; high level languages; invasive software; virtual machines; API; Microsoft Windows executable binaries malicious features; Python programming language; XOR; antidebugger detector; antivirtual machine; application programming interface; binary entropy information; dynamic analysis; extractor; malware analysis process; multiple features; pingaji; static analysis; Cryptography; Detectors; Entropy; Feature extraction; Malware; Software; Virtual machining; feature selection; malware; static analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Modelling and Simulation (UKSim), 2012 UKSim 14th International Conference on
Conference_Location :
Cambridge
Print_ISBN :
978-1-4673-1366-7
Type :
conf
DOI :
10.1109/UKSim.2012.40
Filename :
6205454
Link To Document :
بازگشت