Open Image Content Disarm And Reconstruction

07/26/2023
by   Eli Belkind, et al.
0

With the advance in malware technology, attackers create new ways to hide their malicious code from antivirus services. One way to obfuscate an attack is to use common files as cover to hide the malicious scripts, so the malware will look like a legitimate file. Although cutting-edge Artificial Intelligence and content signature exist, evasive malware successfully bypasses next-generation malware detection using advanced methods like steganography. Some of the files commonly used to hide malware are image files (e.g., JPEG). In addition, some malware use steganography to hide malicious scripts or sensitive data in images. Steganography in images is difficult to detect even with specialized tools. Image-based attacks try to attack the user's device using malicious payloads or utilize image steganography to hide sensitive data inside legitimate images and leak it outside the user's device. Therefore in this paper, we present a novel Image Content Disarm and Reconstruction (ICDR). Our ICDR system removes potential malware, with a zero trust approach, while maintaining high image quality and file usability. By extracting the image data, removing it from the rest of the file, and manipulating the image pixels, it is possible to disable or remove the hidden malware inside the file.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/02/2021

Intensive Image Malware Analysis and Least Significant Bit Matching Steganalysis

Malware as defined by Kaspersky Labs is a type of computer program desig...
research
06/28/2018

Robust Neural Malware Detection Models for Emulation Sequence Learning

Malicious software, or malware, presents a continuously evolving challen...
research
10/10/2019

Would a File by Any Other Name Seem as Malicious?

Successful malware attacks on information technology systems can cause m...
research
11/03/2017

Decentralised firewall for malware detection

This paper describes the design and development of a decentralized firew...
research
03/14/2022

Toward the Detection of Polyglot Files

Standardized file formats play a key role in the development and use of ...
research
03/19/2021

Fight Virus Like a Virus: A New Defense Method Against File-Encrypting Ransomware

Nowadays ransomware has become a new profitable form of attack. This typ...
research
06/09/2023

AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora

When investigating a malicious file, searching for related files is a co...

Please sign up or login with your details

Forgot password? Click here to reset