{"title":"使用便携式可执行文件阅读器模块(PEFile)生成用于静态分析的Windows便携式可执行文件的特征","authors":"Rico S. Santos, E. Festijo","doi":"10.1109/ic2ie53219.2021.9649225","DOIUrl":null,"url":null,"abstract":"The identification of malicious program at an early stage has been proven to be effective in reducing the chance of malware infection on the device or a system. A common approach to do this is through static analysis. Static analysis examines the source code of portable executable (PE) files without actually executing them. Selecting static features that will be used to for static analysis is an arduous process. To address this issue and in preparation for selecting static features for static analysis, this paper explores the use of PEFILE, a Python-based toolkit to analyze PE scripts. PEFILE is a versatile application that analyze malware files in a virtual environment. Four different datasets of malware packages are investigated using PEFILE. Three different algorithms are used to create the final output, namely 1) Extraction algorithm (Feature Extraction), 2) Selection algorithm (Feature Selection) and 3) Dataset Algorithm (Dataset Creation). The selected features from each malware packages are then compared and analyzed.","PeriodicalId":178443,"journal":{"name":"2021 4th International Conference of Computer and Informatics Engineering (IC2IE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Generating Features of Windows Portable Executable Files for Static Analysis using Portable Executable Reader Module (PEFile)\",\"authors\":\"Rico S. Santos, E. Festijo\",\"doi\":\"10.1109/ic2ie53219.2021.9649225\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The identification of malicious program at an early stage has been proven to be effective in reducing the chance of malware infection on the device or a system. A common approach to do this is through static analysis. Static analysis examines the source code of portable executable (PE) files without actually executing them. Selecting static features that will be used to for static analysis is an arduous process. To address this issue and in preparation for selecting static features for static analysis, this paper explores the use of PEFILE, a Python-based toolkit to analyze PE scripts. PEFILE is a versatile application that analyze malware files in a virtual environment. Four different datasets of malware packages are investigated using PEFILE. Three different algorithms are used to create the final output, namely 1) Extraction algorithm (Feature Extraction), 2) Selection algorithm (Feature Selection) and 3) Dataset Algorithm (Dataset Creation). The selected features from each malware packages are then compared and analyzed.\",\"PeriodicalId\":178443,\"journal\":{\"name\":\"2021 4th International Conference of Computer and Informatics Engineering (IC2IE)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 4th International Conference of Computer and Informatics Engineering (IC2IE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ic2ie53219.2021.9649225\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 4th International Conference of Computer and Informatics Engineering (IC2IE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ic2ie53219.2021.9649225","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Generating Features of Windows Portable Executable Files for Static Analysis using Portable Executable Reader Module (PEFile)
The identification of malicious program at an early stage has been proven to be effective in reducing the chance of malware infection on the device or a system. A common approach to do this is through static analysis. Static analysis examines the source code of portable executable (PE) files without actually executing them. Selecting static features that will be used to for static analysis is an arduous process. To address this issue and in preparation for selecting static features for static analysis, this paper explores the use of PEFILE, a Python-based toolkit to analyze PE scripts. PEFILE is a versatile application that analyze malware files in a virtual environment. Four different datasets of malware packages are investigated using PEFILE. Three different algorithms are used to create the final output, namely 1) Extraction algorithm (Feature Extraction), 2) Selection algorithm (Feature Selection) and 3) Dataset Algorithm (Dataset Creation). The selected features from each malware packages are then compared and analyzed.