Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Publication date | 2010 |
---|---|
Host publication | Future Generation Information Technology |
Editors | T. H. Kim, Y. H. Lee, B. H. Kang, D. Slezak |
Publisher | Springer |
Pages | 394-401 |
Number of pages | 8 |
ISBN (print) | 9783642175688 |
<mark>Original language</mark> | English |
Event | 2nd International Mega-Conference on Future Generation Information Technology - Jeju Island, United Kingdom Duration: 1/12/2010 → … |
Conference | 2nd International Mega-Conference on Future Generation Information Technology |
---|---|
Country/Territory | United Kingdom |
Period | 1/12/10 → … |
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 6485 |
ISSN (Print) | 0302-9743 |
Conference | 2nd International Mega-Conference on Future Generation Information Technology |
---|---|
Country/Territory | United Kingdom |
Period | 1/12/10 → … |
The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of making malware undetectable in general and code mutation techniques in particular. We also supported our argument where possible, through different tools and have revealed their outcome. In the end we give our methodology to make any virus undetectable using amalgamation of hex editing and metamorphic techniques.