Home > Research > Publications & Outputs > Evading virus detection using code obfuscation

Links

Text available via DOI:

View graph of relations

Evading virus detection using code obfuscation

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Evading virus detection using code obfuscation. / Murad, Khurram; Shirazi, Syed Noorulhassan; Bin Zikria, Yousaf et al.
Future Generation Information Technology. ed. / T. H. Kim; Y. H. Lee; B. H. Kang; D. Slezak. Springer, 2010. p. 394-401 (Lecture Notes in Computer Science; Vol. 6485).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Murad, K, Shirazi, SN, Bin Zikria, Y & Ikram, N 2010, Evading virus detection using code obfuscation. in TH Kim, YH Lee, BH Kang & D Slezak (eds), Future Generation Information Technology. Lecture Notes in Computer Science, vol. 6485, Springer, pp. 394-401, 2nd International Mega-Conference on Future Generation Information Technology, United Kingdom, 1/12/10. https://doi.org/10.1007/978-3-642-17569-5_39

APA

Murad, K., Shirazi, S. N., Bin Zikria, Y., & Ikram, N. (2010). Evading virus detection using code obfuscation. In T. H. Kim, Y. H. Lee, B. H. Kang, & D. Slezak (Eds.), Future Generation Information Technology (pp. 394-401). (Lecture Notes in Computer Science; Vol. 6485). Springer. https://doi.org/10.1007/978-3-642-17569-5_39

Vancouver

Murad K, Shirazi SN, Bin Zikria Y, Ikram N. Evading virus detection using code obfuscation. In Kim TH, Lee YH, Kang BH, Slezak D, editors, Future Generation Information Technology. Springer. 2010. p. 394-401. (Lecture Notes in Computer Science). doi: 10.1007/978-3-642-17569-5_39

Author

Murad, Khurram ; Shirazi, Syed Noorulhassan ; Bin Zikria, Yousaf et al. / Evading virus detection using code obfuscation. Future Generation Information Technology. editor / T. H. Kim ; Y. H. Lee ; B. H. Kang ; D. Slezak. Springer, 2010. pp. 394-401 (Lecture Notes in Computer Science).

Bibtex

@inproceedings{53501ab169af43eaa7ad65961d46d176,
title = "Evading virus detection using code obfuscation",
abstract = "The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of making malware undetectable in general and code mutation techniques in particular. We also supported our argument where possible, through different tools and have revealed their outcome. In the end we give our methodology to make any virus undetectable using amalgamation of hex editing and metamorphic techniques.",
keywords = "Computer virus, Polymorphism, Metamorphism, Obfuscation, Hex editing, Virus signature",
author = "Khurram Murad and Shirazi, {Syed Noorulhassan} and {Bin Zikria}, Yousaf and Nassar Ikram",
year = "2010",
doi = "10.1007/978-3-642-17569-5_39",
language = "English",
isbn = "9783642175688",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "394--401",
editor = "Kim, {T. H.} and Lee, {Y. H.} and Kang, {B. H.} and D. Slezak",
booktitle = "Future Generation Information Technology",
note = "2nd International Mega-Conference on Future Generation Information Technology ; Conference date: 01-12-2010",

}

RIS

TY - GEN

T1 - Evading virus detection using code obfuscation

AU - Murad, Khurram

AU - Shirazi, Syed Noorulhassan

AU - Bin Zikria, Yousaf

AU - Ikram, Nassar

PY - 2010

Y1 - 2010

N2 - The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of making malware undetectable in general and code mutation techniques in particular. We also supported our argument where possible, through different tools and have revealed their outcome. In the end we give our methodology to make any virus undetectable using amalgamation of hex editing and metamorphic techniques.

AB - The conflict between malware authors and analysts is heating up as both are coming up with new armaments in their armory. Malware authors are employing novel sophisticated techniques like metamorphosis to thwart detection mechanisms while security professionals are budding new ways to confront them. In this paper we formally treat diverse mechanisms of making malware undetectable in general and code mutation techniques in particular. We also supported our argument where possible, through different tools and have revealed their outcome. In the end we give our methodology to make any virus undetectable using amalgamation of hex editing and metamorphic techniques.

KW - Computer virus

KW - Polymorphism

KW - Metamorphism

KW - Obfuscation

KW - Hex editing

KW - Virus signature

U2 - 10.1007/978-3-642-17569-5_39

DO - 10.1007/978-3-642-17569-5_39

M3 - Conference contribution/Paper

SN - 9783642175688

T3 - Lecture Notes in Computer Science

SP - 394

EP - 401

BT - Future Generation Information Technology

A2 - Kim, T. H.

A2 - Lee, Y. H.

A2 - Kang, B. H.

A2 - Slezak, D.

PB - Springer

T2 - 2nd International Mega-Conference on Future Generation Information Technology

Y2 - 1 December 2010

ER -