From Static to AI-Driven Detection: A Comprehensive Review of Obfuscated Malware Techniques

被引:1
作者
Chandran, Saranya [1 ]
Syam, Sreelakshmi R. [1 ]
Sankaran, Sriram [1 ]
Pandey, Tulika [2 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Ctr Cybersecur Syst & Networks, Amritapuri 690525, India
[2] Govt India, Minist Elect & Informat Technol, Natl E Governance Div, New Delhi 110003, India
关键词
Malware; Codes; Reviews; Deep learning; Surveys; Forensics; Real-time systems; Ransomware; Encryption; Systematics; Android; artificial intelligence; deep learning; digital twins; generative AI; hybrid detection methods; machine learning; memory forensics; obfuscated malware; obfuscation techniques; SYSTEM;
D O I
10.1109/ACCESS.2025.3550781
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The frequency of cyber attacks targeting individuals, businesses, and organizations globally has escalated in recent years. The evolution of obfuscated malware, designed to evade detection, has been unprecedented, employing new and sophisticated mechanisms to breach systems, steal sensitive data, and disrupt operations. This work advances research on obfuscated malware detection by offering a comprehensive review of studies conducted over the past decade on multiple platforms. In addition, the diversity of obfuscation techniques and the effectiveness of detection methods, such as static, dynamic, hybrid, and AI, are presented in a comparative manner. Furthermore, memory forensics, an often underexplored area, is of paramount importance for real-time analysis and the detection of advanced obfuscated malware. Hybrid analysis, which amalgamates the strengths of various approaches, emerges as a robust solution against obfuscated malware detection. The role of AI in detecting advanced ransomware, spyware, and fileless malware by enabling real-time detection and adaptive defenses against these increasingly prevalent threats is presented. In addition, a novel framework is proposed, combining Generative AI and digital twins to simulate and predict malware behavior, offering enhanced detection capabilities. This study synthesizes the findings of 76 approaches for the detection of obfuscated malware, incorporates cutting-edge technologies, and identifies open research challenges, such as ensuring scalability, enhancing generalization across platforms, and reducing resource requirements for constrained environments to guide future advancements in obfuscated malware detection.
引用
收藏
页码:74335 / 74358
页数:24
相关论文
共 116 条
[1]   Dynamic IoT Malware Detection in Android Systems Using Profile Hidden Markov Models [J].
Abanmi, Norah ;
Kurdi, Heba ;
Alzamel, Mai .
APPLIED SCIENCES-BASEL, 2023, 13 (01)
[2]  
Abualhaj M.M., 2024, Bull. Electr. Eng. Informat., V13, P3653
[3]  
Abualhaj M. M., 2024, Int. J. Data Netw. Sci., V8, P733
[4]   Malware classification and composition analysis: A survey of recent developments [J].
Abusitta, Adel ;
Li, Miles Q. ;
Fung, Benjamin C. M. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
[5]  
Achuthan K., 2025, Humanities Social Sci. Commun., V12, P1
[6]   Public sentiment and engagement on cybersecurity: Insights from Reddit discussions [J].
Achuthan, Krishnashree ;
Khobragade, Sugandh ;
Kowalski, Robin .
COMPUTERS IN HUMAN BEHAVIOR REPORTS, 2025, 17
[7]   Integrating sustainability into cybersecurity: insights from machine learning based topic modeling [J].
Achuthan, Krishnashree ;
Sankaran, Sriram ;
Roy, Swapnoneel ;
Raman, Raghu .
DISCOVER SUSTAINABILITY, 2025, 6 (01)
[8]   JS']JSOD: Java']JavaScript obfuscation detector [J].
AL-Taharwa, Ismail Adel ;
Lee, Hahn-Ming ;
Jeng, Albert B. ;
Wu, Kuo-Ping ;
Ho, Cheng-Seen ;
Chen, Shyi-Ming .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) :1092-1107
[9]   XMal: A lightweight memory-based explainable obfuscated-malware detector [J].
Alani M.M. ;
Mashatan A. ;
Miri A. .
Computers and Security, 2023, 133
[10]   MALGRA: Machine Learning and N-Gram Malware Feature Extraction and Detection System [J].
Ali, Muhammad ;
Shiaeles, Stavros ;
Bendiab, Gueltoum ;
Ghita, Bogdan .
ELECTRONICS, 2020, 9 (11) :1-20