five

Low-entropy Packed Binary Detection using Hardware Performance Counters

收藏
NIAID Data Ecosystem2026-05-01 收录
下载链接:
https://zenodo.org/record/10440483
下载链接
链接失效反馈
官方服务:
资源简介:
Malware analysis faces a critical challenge in accurately identifying packed executables, especially those with low entropy. Existing software-based solutions often fail in detecting packers used by malware, resulting in inaccurate classifications. To address this shortcoming, in this study we introduce a novel method usingHardware Performance Counters (HPCs) to facilitate the classification of binary packers due to HPCs’ minimal access overhead and ability to obviate the necessity for source code. We trained classic machine-learning models by selecting relevant hardware attributes associated with the unpacking procedure for detectingpackers used by low-entropy binary programs. Extensive experiments shows the substantial role played by Hardware Performance Counters in detecting binary packing characterized by low entropy,offering a promising avenue for further exploration and refinement of techniques in malware analysis The following zip files are executables that represent low entropy versions of software packers using byte-padding. The name of the files are the names of the packers which are represened,  Acprotect, Armadillo, Aspack, Nspack, Pecompact, Petite, UPX, and Zprotect. These can be used to measure the unpacking process using hardware performance counters in order to test & train machine earning classifiers for accurate classification of low entropy packers.
创建时间:
2023-12-30
5,000+
优质数据集
54 个
任务类型
进入经典数据集
二维码
社区交流群

面向社区/商业的数据集话题

二维码
科研交流群

面向高校/科研机构的开源数据集话题

数据驱动未来

携手共赢发展

商业合作