Publications
Malware behavior through network trace analysis
Abstract
Malware continues to be a major threat to information security. To avoid being detected and analyzed, modern malware is continuously improving its stealthiness. A high number of unique malware samples detected daily suggests a likely high degree of code reuse and obfuscation to avoid detection. Traditional malware detection techniques relying on binary code signatures are greatly hindered by encryption, packing, code polymorphism, and similar other obfuscation techniques. Although obfuscation greatly changes a malware’s binary, its functionalities remain intact.
We propose to study malware’s network behavior during its execution, to understand the malware’s functionality. While malware may transform its code to evade analysis, we contend that its key network behaviors must endure through the transformations to achieve the malware’s ultimate purpose, such as sending victim information …
- Date
- September 13, 2025
- Authors
- Xiyue Deng, Jelena Mirkovic
- Conference
- Selected Papers from the 12th International Networking Conference: INC 2020 12
- Pages
- 3-18
- Publisher
- Springer International Publishing