De-Obfuscating Emerging Malware Threats Using Reverse Engineering Techniques
Article Sidebar
Main Article Content
Abstract: The rapid evolution of malware poses a significant cybersecurity challenge, as attackers increasingly employ sophisticated obfuscation techniques to evade detection. Polymorphic and metamorphic malware utilise different obfuscation techniques such as packing, encryption, and code mutation to evade traditional signature-based detection models. Conventional static and dynamic analysis tools frequently struggle to de-obfuscate these threats. This paper proposes a novel system that integrates reverse engineering techniques with ensemble learning models containing Gradient Boosting Machines, Convolutional Neural Networks, and Gated Recurrent Units, to address these challenges. Reverse engineering enables in-depth structural and behavioural analysis of malicious binaries, exposing hidden payloads and execution patterns. Ensemble learning enhances detection by combining the strengths of multiple algorithms to improve accuracy and adaptability. The proposed system not only identifies obfuscated malware with high precision but also predicts emerging variants, offering resilience against evasion tactics. By uniting explainable reverse engineering with advanced ensemble learning, the system provides scalable, real-time protection against evolving malware threats.
Downloads
References
Chen, X., Li, Y., Zhang, T., & Wang, H. (2021). Malware obfuscation techniques and their impact on detection: A survey. Journal of Information Security and Applications, 58, 102–115. https://doi.org/10.1016/j.jisa.2020.102615
Christodorescu, M., Jha, S., & Seshia, S. A. (2005). Semantics-aware malware detection. IEEE Symposium on Security and Privacy, 32–46. https://doi.org/10.1109/SP.2005.20
Li, Y., Chen, H., Xu, J., & Zhao, Y. (2024). PowerPeeler: A dynamic framework for de-obfuscating malicious PowerShell scripts. Computers & Security, 138, 103590. https://doi.org/10.1016/j.cose.2024.103590
Patsakis, C., Mermigas, D., & Fotiadis, P. (2024). Leveraging large language models for malware de-obfuscation and threat intelligence. Future Generation Computer Systems, 156, 18–32. https://doi.org/10.1016/j.future.2024.01.005
Rahman, M., Saha, R., & Ahmed, T. (2023). Enhancing adversarial robustness of malware detectors with GAN-based augmentation. Expert Systems with Applications, 229, 120573. https://doi.org/10.1016/j.eswa.2023.120573
Salehi, F., Sharif, H., & Kaur, S. (2020). Metamorphic malware detection using machine learning techniques. Journal of Computer Virology and Hacking Techniques, 16(2), 101–114. https://doi.org/10.1007/s11416-019-00349-2
Ucci, D., Aniello, L., & Baldoni, R. (2019). Survey of machine learning techniques for malware analysis. Computers & Security, 81, 123–147. https://doi.org/10.1016/j.cose.2018.11.001
Wu, J., Zhang, L., & Huang, M. (2023). Reinforcement learning for adaptive malware detection in dynamic environments. IEEE Transactions on Information Forensics and Security, 18, 2456–2469. https://doi.org/10.1109/TIFS.2023.3245678
Zhou, K., Chen, Y., & Lin, Z. (2022). Integrating reverse engineering and generative adversarial networks for robust malware detection. ACM Transactions on Privacy and Security, 25(4), 1–25. https://doi.org/10.1145/3518997

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.