№2, 2024
EVASION TECHNIQUES IN MALWARE DETECTION: CHALLENGES AND COUNTERMEASURES
In the ever-evolving digital landscape, the escalating sophistication of malware poses a substantial threat, necessitating continual advancements in detection methods. This paper addresses the pervasive challenge of evasion techniques employed by malware to circumvent standard security measures. Focused on understanding the intricate methods employed by malware developers, our study explores the dynamic nature of this cyber threat. As malicious actors continually refine their approaches, a nuanced understanding of evasion tactics becomes paramount for developing effective countermeasures. The research emphasizes the need for robust defense mechanisms capable of adapting to the constantly changing cyber threat landscape. By unraveling the complexities of evasion techniques, this paper contributes valuable insights to the development of proactive and resilient cybersecurity measures. Through an exploration of specific evasion tactics, we aim to inform and empower cybersecurity professionals, facilitating the creation of strategies capable of effectively mitigating the risks posed by these dynamic digital threats (pp.9-15).
Abijah, R., & Geetha, S. (2021). A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks. Computers & Electrical Engineering, 92, 1-18.
https://doi.org/10.1016/j.compeleceng.2021.107143
Alakbarov, R. (2023). Security issues and solution mechanisms in cloud computing systems: a review. Problems of Information Technology, 14(2), 12-22.
http://doi.org/10.25045/jpit.v14.i2.02
Alexei, B., & Bulent, Y. (2017). A Survey On Automated Dynamic Malware Analysis Evasion and Counter-Evasion. ROOTS: Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium, 1-21.
https://doi.org/10.1145/3150376.3150378
Baghirov, E. (2023). Malware detection based on opcode frequency. Problems of Information Technology, 14(1), 3-7.
https://doi.org/10.25045/jpit.v14.i1.01
Borja, M., Antonio, R., Alessio, M., et al. (2023). Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection. arXiv:2310.15645. https://doi.org/10.48550/arXiv.2310.15645
Chandra, S. V., Peter, L. K., Zhaohui, T., & Forest, T. (2018). Taxonomy on Malware Evasion Countermeasures Techniques. IEEE 4th World Forum on Internet of Things (WF-IoT), 1-6.
https://doi.org/10.1109/WF-IoT.2018.8355202
Farnood, F., Mohammad, Z., & Steven, D. (2022). CamoDroid: An Android application analysis environment resilient against sandbox evasion. Journal of Systems Architecture, 125, 1-10.
https://doi.org/10.1016/j.sysarc.2022.102452
Haikuo, Y., & Brandon, L. (2023). A Method for Summarizing and Classifying Evasive Malware. Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, 455-470. New York.
https://doi.org/10.1145/3607199.3607207
Hayyan, H., Behrouz, T., & Bahman, Z. (2023). Maaker: A framework for detecting and defeating evasion techniques in Android malware. Journal of Information Security and Applications, 78, 14-26.
https://doi.org/10.1016/j.jisa.2023.103617
Hemant, R., Adarsh, N., Sanjay, K. S., & Mohit, S. (2023). Adversarial superiority in android malware detection: Lessons from reinforcement learning based evasion attacks and defenses. Forensic Science International: Digital Investigation, 44, 1-10.
https://doi.org/10.1016/j.fsidi.2023.301511
Hemant, R., Animesh, S., & Sanjay, K. S. (2022). Defending malware detection models against evasion based adversarial attacks. Pattern Recognition Letters, 164, 119-125.
https://doi.org/10.1016/j.patrec.2022.10.010
Hojjat, A., Fabio, G., & Francesco, M. et al. (2020). When Malware is Packin’ Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features. Network and Distributed Systems Security (NDSS) Symposium, 23-26 February, San Diego, CA, USA, 1-20.
https://dx.doi.org/10.14722/ndss.2020.24310
Imamverdiyev, Y. (2021). Analysis Of Cybersecurity Problems In Process Control Systems. Problems of Information Technology, 2, 16–29.
https://doi.org/10.25045/jpit.v12.i2.02
Jiaxuan, G., Junfeng, W., & Zhiyang, F., et al. (2024). A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. Computers & Security, 137, 1-10.
https://doi.org/10.1016/j.cose.2023.103595
Kowshik, S.R., Tanim, A., & Pritom, B.U., et al. (2023). MalHyStack: A hybrid stacked ensemble learning framework with feature engineering schemes for obfuscated malware analysis. Intelligent Systems with Applications, 20, 1-17.
https://doi.org/10.1016/j.iswa.2023.200283
Lichen, J., Yang, Y., Bowen, T., & Zihan, J. (2023). ERMDS: A obfuscation dataset for evaluating robustness of learning-based malware detection system. BenchCouncil Transactions on Benchmarks, Standards and Evaluations, 3, 1-13.
https://doi.org/10.1016/j.tbench.2023.100106
Melissa, C., & Vivek, B. (2018). Effectiveness of Android Obfuscation on Evading Anti-malware. CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 143–145.
https://doi.org/10.1145/3176258.3176942
Shikhaliyev, R. (2024). Cybersecurity risks management of industrial control systems: A review. Problems of Information Technology, 15(1), 37-43.
https://doi.org/10.25045/jpit.v15.i1.05