№2, 2024

EVASION TECHNIQUES IN MALWARE DETECTION: CHALLENGES AND COUNTERMEASURES

Yadigar Imamverdiyev, Elshan Baghirov

In the ever-evolving digital landscape, the escalating sophistication of malware poses a substantial threat, necessitating continual advancements in detection methods. This paper addresses the pervasive challenge of evasion techniques employed by malware to circumvent standard security measures. Focused on understanding the intricate methods employed by malware developers, our study explores the dynamic nature of this cyber threat. As malicious actors continually refine their approaches, a nuanced understanding of evasion tactics becomes paramount for developing effective countermeasures. The research emphasizes the need for robust defense mechanisms capable of adapting to the constantly changing cyber threat landscape. By unraveling the complexities of evasion techniques, this paper contributes valuable insights to the development of proactive and resilient cybersecurity measures. Through an exploration of specific evasion tactics, we aim to inform and empower cybersecurity professionals, facilitating the creation of strategies capable of effectively mitigating the risks posed by these dynamic digital threats (pp.9-15).

Keywords: Malware, Malware detection, Evasion techniques, Cybersecurity, Obfuscation
References

Abijah, R., & Geetha, S. (2021). A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks. Computers & Electrical Engineering, 92, 1-18. 
https://doi.org/10.1016/j.compeleceng.2021.107143

Alakbarov, R. (2023). Security issues and solution mechanisms in cloud computing systems: a review. Problems of Information Technology, 14(2), 12-22. 
http://doi.org/10.25045/jpit.v14.i2.02

Alexei, B., & Bulent, Y. (2017). A Survey On Automated Dynamic Malware Analysis Evasion and Counter-Evasion. ROOTS: Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium, 1-21. 
https://doi.org/10.1145/3150376.3150378

Baghirov, E. (2023). Malware detection based on opcode frequency. Problems of Information Technology, 14(1), 3-7. 
https://doi.org/10.25045/jpit.v14.i1.01

Borja, M., Antonio, R., Alessio, M., et al. (2023). Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection. arXiv:2310.15645. https://doi.org/10.48550/arXiv.2310.15645

Chandra, S. V., Peter, L. K., Zhaohui, T., & Forest, T. (2018). Taxonomy on Malware Evasion Countermeasures Techniques. IEEE 4th World Forum on Internet of Things (WF-IoT), 1-6.
https://doi.org/10.1109/WF-IoT.2018.8355202

Farnood, F., Mohammad, Z., & Steven, D. (2022). CamoDroid: An Android application analysis environment resilient against sandbox evasion. Journal of Systems Architecture, 125, 1-10. 
https://doi.org/10.1016/j.sysarc.2022.102452

Haikuo, Y., & Brandon, L. (2023). A Method for Summarizing and Classifying Evasive Malware. Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, 455-470. New York. 
https://doi.org/10.1145/3607199.3607207

Hayyan, H., Behrouz, T., & Bahman, Z. (2023). Maaker: A framework for detecting and defeating evasion techniques in Android malware. Journal of Information Security and Applications, 78, 14-26. 
https://doi.org/10.1016/j.jisa.2023.103617

Hemant, R., Adarsh, N., Sanjay, K. S., & Mohit, S. (2023). Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses. Forensic Science International: Digital Investigation, 44, 1-10. 
https://doi.org/10.1016/j.fsidi.2023.301511

Hemant, R., Animesh, S., & Sanjay, K. S. (2022). Defending malware detection models against evasion based adversarial attacks. Pattern Recognition Letters, 164, 119-125. 
https://doi.org/10.1016/j.patrec.2022.10.010

Hojjat, A., Fabio, G., & Francesco, M. et al. (2020). When Malware is Packin’ Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. Network and Distributed Systems Security (NDSS) Symposium, 23-26 February, San Diego, CA, USA, 1-20. 
https://dx.doi.org/10.14722/ndss.2020.24310

Imamverdiyev, Y. (2021). Analysis Of Cybersecurity Problems In Process Control Systems. Problems of Information Technology, 2, 16–29. 
https://doi.org/10.25045/jpit.v12.i2.02

Jiaxuan, G., Junfeng, W., & Zhiyang, F., et al. (2024). A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. Computers & Security, 137, 1-10. 
https://doi.org/10.1016/j.cose.2023.103595

Kowshik, S.R., Tanim, A., & Pritom, B.U., et al. (2023). MalHyStack: A hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis. Intelligent Systems with Applications, 20, 1-17. 
https://doi.org/10.1016/j.iswa.2023.200283

Lichen, J., Yang, Y., Bowen, T., & Zihan, J. (2023). ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system. BenchCouncil Transactions on Benchmarks, Standards and Evaluations, 3, 1-13. 
https://doi.org/10.1016/j.tbench.2023.100106

Melissa, C., & Vivek, B. (2018). Effectiveness of Android Obfuscation on Evading Anti-malware. CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 143–145. 
https://doi.org/10.1145/3176258.3176942

Shikhaliyev, R. (2024). Cybersecurity risks management of industrial control systems: A review. Problems of Information Technology, 15(1), 37-43. 
https://doi.org/10.25045/jpit.v15.i1.05