Content area

Abstract

Consistent detection of malicious loaders across varied programming languages and build tools remains a significant cybersecurity challenge. This study empirically measures how compiler and language choices affect the detectability of standard in-memory Windows loaders. We implement functionally equivalent loaders (allocate, copy, protect, execute) in C, C#, Fortran, and COBOL, embedding an identical x64 test payload to isolate behavior. Our results reveal significant detection gaps: loaders compiled in legacy languages (Fortran, COBOL) consistently evade static and dynamic antivirus engines that easily flag their C and C# counterparts. We demonstrate this evasion is not due to behavioral differences, but to compiler-specific static artifacts. These artifacts, such as interleaved zero-bytes in Fortran and fragmented payload-construction logic in COBOL, effectively break common signature matching. These findings indicate that many detection tools are overly sensitive to the static build surface rather than true semantic behavior. We provide actionable guidance favoring behavior-focused analysis, such as tracking API call order and memory protection changes, to address this critical legacy code blind spot.

Details

1009240
Business indexing term
Title
Legacy Code, Live Risk: Empirical Evidence of Malware Detection Gaps
Author
Gang-Cheng, Huang 1   VIAFID ORCID Logo  ; Tai-Hung, Lai 2   VIAFID ORCID Logo 

 Department of Computer Science and Information Engineering, China University of Technology, Taipei 116, Taiwan; [email protected] 
 Department of Computer Science and Information Engineering, Chung Cheng Institute of Technology, National Defense University, Taoyuan 335009, Taiwan 
Publication title
Volume
15
Issue
22
First page
11862
Number of pages
19
Publication year
2025
Publication date
2025
Publisher
MDPI AG
Place of publication
Basel
Country of publication
Switzerland
Publication subject
e-ISSN
20763417
Source type
Scholarly Journal
Language of publication
English
Document type
Journal Article
Publication history
 
 
Online publication date
2025-11-07
Milestone dates
2025-10-18 (Received); 2025-11-06 (Accepted)
Publication history
 
 
   First posting date
07 Nov 2025
ProQuest document ID
3275502786
Document URL
https://www.proquest.com/scholarly-journals/legacy-code-live-risk-empirical-evidence-malware/docview/3275502786/se-2?accountid=208611
Copyright
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Last updated
2025-11-26
Database
ProQuest One Academic