allocated memory during runtime and detect roughly
95 percent of all malicious programs from the system
memory behavior.
The importance of detecting new malware is ex-
tremely high to prevent new attacks from harm-
ing systems. Many techniques have high detection
rates on known malware using in-depth training tech-
niques. However, while comparing previous works, it
can be identified that the works do not deal with new
never seen before malware. As a solution for this, (Si-
hwail et al., 2019) suggests using memory forensics to
extract artifacts from memory combined with mem-
ory feature extraction. Based on past known mal-
ware and the extracted artifacts, the framework can
determine what future malware will consist of. Re-
sults showed that the model has an extremely high
detection rate and accuracy while still keeping a low
amount of time needed to run.
As some malware like Objective-C malware, also
known as userland, puts MacOS X systems at risk,
(Case and Richard, 2016) proposed a plugin for the
Volatility framework that focuses on automatically
analyzing the artifacts of the system that have impor-
tance. This is done by monitoring the Objective-C
at runtime and outputting a file that can be analyzed.
Based on this file, it can be examined and determined
how to deal with the current situation. This results
in a fast analysis time and less work for the analysts,
thus allowing more systems to be monitored in the
same amount of time. As typical Malware detection
and unpacking tools can be detected from the mal-
ware debuggers, malware stays dormant during scans
and avoids malware detection methods.
However, according to (Kawakoya et al., 2010),
while using the stealth debugger, malware is not
aware when to stay dormant or when to run to avoid
malware detection scans. In addition to that, the
stealth debugger takes the virtual machine memory
and sends it to the guest operating system. After
which, it runs the analysis to identify the true origins
of the code. Since most malware is advanced enough
to contain obfuscation methods, this model can detect
most packers at an incredibly high accuracy rate, with
some packers getting a perfect detection rate. While
static and dynamic approaches are a good start for de-
tecting malware, they can often be exploited by obfus-
cated malware, leading to malware deactivating the
detection methods. Using application-specific detec-
tion with machine learning, (Xu et al., 2017) was able
to get nearly a perfect malware detection rate. This
method works on the top layer and works down to
the kernel level, where many corruption attacks can
occur. With this approach, corruption attacks were
stopped 99 percent of the time with less than a five
percent false positive rate.
To combat the malware obfuscation techniques,
the detection method needs to be designed with ob-
fuscation in mind. This can be done using a specif-
ically designed dataset to test how well a detection
system deals with obfuscated malware. (Sadek et al.,
2019) challenged detection methods by using a large
dataset that consists of positive and negative memory
snapshots, advanced payload systems, and malware
obfuscation. (Bozkir et al., 2021) have come up with
a novel approach that uses an RGB image to show
memory dump files in their malware detection sys-
tem.
While using the manifold learning technique
called UMAP, (Javaheri and Hosseninzadeh, 2017)
identified the original memory dump file showing ma-
licious or benign activity. After testing with ten mal-
ware families and benign samples, the results were
roughly 96 percent accuracy at the extremely fast
speed of only 3.56 seconds. Moreover, a framework
was also developed to combat the obfuscation of mal-
ware. Using the detection presence time of the mal-
ware at each level of the operating system down to the
kernel, they were able to dump the malware memory
at the precise time and view the malware installation.
The framework was focused specifically on obfusca-
tion and packaging in mind to challenge one of the
biggest problems in malware detection. After testing
the framework, it obtained roughly 85 percent accu-
racy in detecting kernel-level malware. Though there
are many different methods to detect obfuscated mal-
ware, each method has to be looked into for different
situations.
Malware and botnets can be difficult to blacklist
when they use obfuscation and concealment. Botnet
command and control servers can also make a real-
time prediction for domain names extremely chal-
lenging. (S et al., 2019), discusses the use of a frame-
work to counter obfuscation by using the LSTM net-
work. This framework operates for both binary and
multi-class data with a high recall rate and precision,
producing a good F1 score. This F1 score consists of
over 80 percent for binary class data and over 60 per-
cent for multi-class data. Moreover, this framework
can be used to help identify concealed and obfuscated
malware in botnet systems.
VMShield, a proposed method by (Mishra et al.,
2021), protects virtual domains in the cloud from ob-
fuscated and stealthy malware attacks. This work
used a state-of-the-art method that collects runtime
behavior from the different processes and analyzes
the results to make obfuscated and stealthy malware
unable to sneak past detection. Passing down to the
system, VMShield is able to monitor the results of
ICISSP 2022 - 8th International Conference on Information Systems Security and Privacy
180