Publication | Closed Access
Looking at the bag is not enough to find the bomb
112
Citations
16
References
2013
Year
Unknown Venue
Pdf FilesEngineeringEvasion TechniqueProgram AnalysisInformation SecurityThreat DetectionAnti-virus TechniqueInformation ForensicsPdf Malware DetectionComputer ScienceReverse MimicryObfuscation (Software)Software AnalysisBomb Damage AssessmentMalware Analysis
PDF files have proved to be excellent malicious-code bearing vectors. Thanks to their flexible logical structure, an attack can be hidden in several ways, and easily deceive protection mechanisms based on file-type filtering. Recent work showed that malicious PDF files can be accurately detected by analyzing their logical structure, with excellent results. In this paper, we present and practically demonstrate a novel evasion technique, called reverse mimicry, that can easily defeat such kind of analysis. We implement it using real samples and validate our approach by testing it against various PDF malware detectors proposed so far. Finally, we highlight the importance of developing systems robust to adversarial attacks and propose a framework to strengthen PDF malware detection against evasion.
| Year | Citations | |
|---|---|---|
Page 1
Page 1