Standard
Evading virus detection using code obfuscation. / Murad, Khurram
; Shirazi, Syed Noorulhassan; Bin Zikria, Yousaf et al.
Future Generation Information Technology. ed. / T. H. Kim; Y. H. Lee; B. H. Kang; D. Slezak. Springer, 2010. p. 394-401 (Lecture Notes in Computer Science; Vol. 6485).
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Harvard
Murad, K
, Shirazi, SN, Bin Zikria, Y & Ikram, N 2010,
Evading virus detection using code obfuscation. in TH Kim, YH Lee, BH Kang & D Slezak (eds),
Future Generation Information Technology. Lecture Notes in Computer Science, vol. 6485, Springer, pp. 394-401, 2nd International Mega-Conference on Future Generation Information Technology, United Kingdom,
1/12/10.
https://doi.org/10.1007/978-3-642-17569-5_39
APA
Murad, K.
, Shirazi, S. N., Bin Zikria, Y., & Ikram, N. (2010).
Evading virus detection using code obfuscation. In T. H. Kim, Y. H. Lee, B. H. Kang, & D. Slezak (Eds.),
Future Generation Information Technology (pp. 394-401). (Lecture Notes in Computer Science; Vol. 6485). Springer.
https://doi.org/10.1007/978-3-642-17569-5_39
Vancouver
Author
Bibtex
@inproceedings{53501ab169af43eaa7ad65961d46d176,
title = "Evading virus detection using code obfuscation",
abstract = "The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of making malware undetectable in general and code mutation techniques in particular. We also supported our argument where possible, through different tools and have revealed their outcome. In the end we give our methodology to make any virus undetectable using amalgamation of hex editing and metamorphic techniques.",
keywords = "Computer virus, Polymorphism, Metamorphism, Obfuscation, Hex editing, Virus signature",
author = "Khurram Murad and Shirazi, {Syed Noorulhassan} and {Bin Zikria}, Yousaf and Nassar Ikram",
year = "2010",
doi = "10.1007/978-3-642-17569-5_39",
language = "English",
isbn = "9783642175688",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "394--401",
editor = "Kim, {T. H.} and Lee, {Y. H.} and Kang, {B. H.} and D. Slezak",
booktitle = "Future Generation Information Technology",
note = "2nd International Mega-Conference on Future Generation Information Technology ; Conference date: 01-12-2010",
}
RIS
TY - GEN
T1 - Evading virus detection using code obfuscation
AU - Murad, Khurram
AU - Shirazi, Syed Noorulhassan
AU - Bin Zikria, Yousaf
AU - Ikram, Nassar
PY - 2010
Y1 - 2010
N2 - The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of making malware undetectable in general and code mutation techniques in particular. We also supported our argument where possible, through different tools and have revealed their outcome. In the end we give our methodology to make any virus undetectable using amalgamation of hex editing and metamorphic techniques.
AB - The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of making malware undetectable in general and code mutation techniques in particular. We also supported our argument where possible, through different tools and have revealed their outcome. In the end we give our methodology to make any virus undetectable using amalgamation of hex editing and metamorphic techniques.
KW - Computer virus
KW - Polymorphism
KW - Metamorphism
KW - Obfuscation
KW - Hex editing
KW - Virus signature
U2 - 10.1007/978-3-642-17569-5_39
DO - 10.1007/978-3-642-17569-5_39
M3 - Conference contribution/Paper
SN - 9783642175688
T3 - Lecture Notes in Computer Science
SP - 394
EP - 401
BT - Future Generation Information Technology
A2 - Kim, T. H.
A2 - Lee, Y. H.
A2 - Kang, B. H.
A2 - Slezak, D.
PB - Springer
T2 - 2nd International Mega-Conference on Future Generation Information Technology
Y2 - 1 December 2010
ER -