Automatic Malware Signature Generation
Luca Cetro
Automatic Malware Signature Generation.
Rel. Giovanni Squillero, Andrea Marcelli, Andrea Atzeni. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2018
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (3MB) | Preview |
Abstract
Automatic malware signature generation The need for automatic and heuristic methodologies to produce malware signatures is still very high, especially considering the huge amount of malwares produced daily. This thesis aims at studying a tool for the automatic signature generation of malicious executables. As most of the business lies on the Microsoft Windows Operating System, the tool developed in this work specifically targets Windows Portable Executables. During the years, several automatic malware detection procedures have been introduced and attempted, most of which trying to discern malicious samples from benign ones; on the contrary, the main goal of the designed tool is the creation of signatures that are capable of synthesizing common features among the set of malwares provided.
It is well known that, nowadays, malwares strongly rely on packers and on obfuscation techniques, that hide the original source code and prevent analysts to run the executable under a controlled environment so to track its behavior
Relatori
Tipo di pubblicazione
URI
![]() |
Modifica (riservato agli operatori) |
