• DocumentCode
    3138080
  • Title

    PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)

  • Author

    Choi, Yang-Seo ; Kim, Ik-kyun ; Oh, Jin-Tae ; Ryou, Jae-Cheol

  • fYear
    2008
  • fDate
    13-15 Oct. 2008
  • Firstpage
    28
  • Lastpage
    31
  • Abstract
    In order to conceal malware, malware authors use the packing and encryption techniques. If the malware is packed or encrypted, then it is very difficult to analyze. Therefore, to prevent the harmful effects of malware and to generate signatures for malware detection, the packed and encrypted executable codes must initially be unpacked. The first step of unpacking is to detect the packed executable files. In this paper, a packed file detection technique (PHAD) based on a PE header analysis is proposed. In many cases, to pack and unpack the executable codes, PE files have unusual attributes in their PE headers. In this paper, these characteristics are utilized to detect the packed files. a characteristic vector (CV) that consists of eight elements is defined, and the Euclidean distance (ED) of the CV is calculated. The EDs of the packed files are calculated and represent the base threshold for the detection of packed files.
  • Keywords
    cryptography; invasive software; Euclidean distance; PE file header analysis; characteristic vector; encryption techniques; malware detection; packed PE file detection technique; packing techniques; Application software; Computer hacking; Computer science; Cryptography; Entropy; Euclidean distance; Frequency; Information security; Scalability; PE header; Pack; detector;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and its Applications, 2008. CSA '08. International Symposium on
  • Conference_Location
    Hobart, ACT
  • Print_ISBN
    978-0-7695-3428-2
  • Type

    conf

  • DOI
    10.1109/CSA.2008.28
  • Filename
    4654055