From Static to AI-Driven Detection: A Comprehensive Review of Obfuscated Malware Techniques

被引:0
作者
Chandran, Saranya [1 ]
Syam, Sreelakshmi R. [1 ]
Sankaran, Sriram [1 ]
Pandey, Tulika [2 ]
Achuthan, Krishnashree [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Ctr Cybersecur Syst & Networks, Amritapuri 690525, India
[2] Govt India, Minist Elect & Informat Technol, Natl E Governance Div, New Delhi 110003, India
关键词
Malware; Codes; Reviews; Deep learning; Surveys; Forensics; Real-time systems; Ransomware; Encryption; Systematics; Android; artificial intelligence; deep learning; digital twins; generative AI; hybrid detection methods; machine learning; memory forensics; obfuscated malware; obfuscation techniques; SYSTEM;
D O I
10.1109/ACCESS.2025.3550781
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The frequency of cyber attacks targeting individuals, businesses, and organizations globally has escalated in recent years. The evolution of obfuscated malware, designed to evade detection, has been unprecedented, employing new and sophisticated mechanisms to breach systems, steal sensitive data, and disrupt operations. This work advances research on obfuscated malware detection by offering a comprehensive review of studies conducted over the past decade on multiple platforms. In addition, the diversity of obfuscation techniques and the effectiveness of detection methods, such as static, dynamic, hybrid, and AI, are presented in a comparative manner. Furthermore, memory forensics, an often underexplored area, is of paramount importance for real-time analysis and the detection of advanced obfuscated malware. Hybrid analysis, which amalgamates the strengths of various approaches, emerges as a robust solution against obfuscated malware detection. The role of AI in detecting advanced ransomware, spyware, and fileless malware by enabling real-time detection and adaptive defenses against these increasingly prevalent threats is presented. In addition, a novel framework is proposed, combining Generative AI and digital twins to simulate and predict malware behavior, offering enhanced detection capabilities. This study synthesizes the findings of 76 approaches for the detection of obfuscated malware, incorporates cutting-edge technologies, and identifies open research challenges, such as ensuring scalability, enhancing generalization across platforms, and reducing resource requirements for constrained environments to guide future advancements in obfuscated malware detection.
引用
收藏
页码:74335 / 74358
页数:24
相关论文
共 116 条
[71]  
Martínez J, 2021, International Journal of Safety and Security Engineering, V11, P537, DOI [10.18280/ijsse.110505, 10.18280/ijsse.110505, DOI 10.18280/IJSSE.110505, 10.18280/IJSSE.110505]
[72]   DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection [J].
Millar, Stuart ;
McLaughlin, Niall ;
del Rincon, Jesus Martinez ;
Miller, Paul ;
Zhao, Ziming .
PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, :353-364
[73]   Generative adversarial network to detect unseen Internet of Things malware [J].
Moti, Zahra ;
Hashemi, Sattar ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Jahromi, Amir Namavar ;
Abdi, Lida ;
Alavi, Fatemeh .
AD HOC NETWORKS, 2021, 122
[74]   Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification [J].
Naeem, Hamad ;
Dong, Shi ;
Falana, Olorunjube James ;
Ullah, Farhan .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 223
[75]   A Malware Detection Scheme via Smart Memory Forensics for Windows Devices [J].
Naeem, Muhammad Rashid ;
Khan, Mansoor ;
Abdullah, Ako Muhammad ;
Noor, Fazal ;
Khan, Muhammad Ijaz ;
Khan, Muhammad Asghar ;
Ullah, Insaf ;
Room, Shah .
MOBILE INFORMATION SYSTEMS, 2022, 2022
[76]   The World of Malware: An Overview [J].
Namanya, Anita Patience ;
Cullen, Andrea ;
Awan, Irfan U. ;
Disso, Jules Pagna .
2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2018), 2018, :420-427
[77]   Fast and Efficient Malware Detection with Joint Static and Dynamic Features Through Transfer Learning [J].
Ngo, Mao, V ;
Tram Truong-Huu ;
Rabadi, Dima ;
Loo, Jia Yi ;
Teo, Sin G. .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 :503-531
[78]   Unified Detection of Obfuscated and Native Android Malware [J].
Ouk, Pagnchakneat C. ;
Pak, Wooguil .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02) :3099-3116
[79]   Deep learning-aided runtime opcode-based Windows malware detection [J].
Parildi, Enes Sinan ;
Hatzinakos, Dimitrios ;
Lawryshyn, Yuri .
NEURAL COMPUTING & APPLICATIONS, 2021, 33 (18) :11963-11983
[80]  
Patsakis C, 2024, Arxiv, DOI [arXiv:2404.19715, 10.1016/j.eswa.2024.124912, DOI 10.1016/J.ESWA.2024.124912]