Use of cryptography in malware obfuscation

Hassan Jameel Asghar*, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection. Use of cryptography may give the impression that these obfuscation techniques have some provable guarantees of success. In this paper, we take a closer look at the use of cryptographic tools to obfuscate malware. We first find that most techniques are easy to defeat (in principle), since the decryption algorithm and the key is shipped within the program. In order to clearly define an obfuscation technique’s potential to evade detection we propose a principled definition of malware obfuscation, and then categorize instances of malware obfuscation that use cryptographic tools into those which evade detection and those which are detectable. We find that schemes that are hard to de-obfuscate necessarily rely on a construct based on environmental keying. We also show that cryptographic notions of obfuscation, e.g., indistinghuishability and virtual black box obfuscation, may not guarantee evasion detection under our model. However, they can be used in conjunction with environmental keying to produce hard to de-obfuscate version of programs.

Original languageEnglish
Pages (from-to)135-152
Number of pages18
JournalJournal of Computer Virology and Hacking Techniques
Volume20
Issue number1
DOIs
Publication statusPublished - Mar 2024

Keywords

  • Malware obfuscation
  • Malware detection
  • Cryptography
  • Environmental keying

Fingerprint

Dive into the research topics of 'Use of cryptography in malware obfuscation'. Together they form a unique fingerprint.

Cite this