Coding Malware in Fancy Programming Languages for Fun and Profit

📅 2025-03-24
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Malware authors increasingly compile malicious payloads using niche programming languages (e.g., Rust, Zig, Nim) to evade signature-based static analysis—whose detection rules are tightly coupled to language-specific syntactic and semantic artifacts. This work presents the first systematic study of “language obfuscation,” a novel adversarial paradigm wherein cross-language compilation undermines industrial antivirus (AV) efficacy. Through controlled binary-level experiments across compilation chains, comparative binary feature analysis, and signature sensitivity evaluation, we demonstrate that migrating identical malicious logic to less common languages significantly degrades detection performance. Empirical evaluation across 12 mainstream AV products shows average detection rates plummeting from 92% to 17% post-migration. Our findings quantitatively establish programming language choice as a critical factor in detection robustness and advocate a paradigm shift—from syntax-driven signature matching toward semantics-aware, language-agnostic static analysis. This work provides both theoretical foundations and empirical evidence for building resilient, language-invariant malware detection frameworks.

Technology Category

Application Category

📝 Abstract
The continuous increase in malware samples, both in sophistication and number, presents many challenges for organizations and analysts, who must cope with thousands of new heterogeneous samples daily. This requires robust methods to quickly determine whether a file is malicious. Due to its speed and efficiency, static analysis is the first line of defense. In this work, we illustrate how the practical state-of-the-art methods used by antivirus solutions may fail to detect evident malware traces. The reason is that they highly depend on very strict signatures where minor deviations prevent them from detecting shellcodes that otherwise would immediately be flagged as malicious. Thus, our findings illustrate that malware authors may drastically decrease the detections by converting the code base to less-used programming languages. To this end, we study the features that such programming languages introduce in executables and the practical issues that arise for practitioners to detect malicious activity.
Problem

Research questions and friction points this paper is trying to address.

Detecting malware in less-used programming languages efficiently
Overcoming strict signature limitations in antivirus solutions
Analyzing features of uncommon languages for malware detection
Innovation

Methods, ideas, or system contributions that make the work stand out.

Detects malware using static analysis
Identifies strict signature limitations
Analyzes less-used language features
🔎 Similar Papers
No similar papers found.
T
Theodoros Apostolopoulos
Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou str., 18534 Piraeus, Greece
V
Vasilios Koutsokostas
Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou str., 18534 Piraeus, Greece
N
Nikolaos Totosis
Department of Informatics, University of Piraeus, 80 Karaoli & Dimitriou str., 18534 Piraeus, Greece
Constantinos Patsakis
Constantinos Patsakis
University of Piraeus
CryptographyComputer SecurityPrivacyBlockchainCybercrime
Georgios Smaragdakis
Georgios Smaragdakis
Professor of Computer Science, Delft University of Technology (TU Delft)
Internet MeasurementInternet SecurityWeb PrivacyContent DeliveryBig Data