Camouflage in Malware : from encryption to metamorphism
Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the mal...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
International Journal of Computer Science and Network Security
2012
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/31722/ http://paper.ijcsns.org/07_book/201208/20120813.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
id |
my.utm.31722 |
---|---|
record_format |
eprints |
spelling |
my.utm.317222019-03-05T02:03:45Z http://eprints.utm.my/id/eprint/31722/ Camouflage in Malware : from encryption to metamorphism Rad, Babak Bashari Masrom, Maslin Ibrahim, Suhaimi QA75 Electronic computers. Computer science Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the process of analyzing and detection prolonged, so the malware can get more time to widely spread. It is very important for antivirus technologies to improve their products by shortening the detection procedure, not only at the first time facing with a new threat, but also in the future detections. In this paper, we intend to review the concept of camouflage in malware and its evolution from non-stealth days to modern metamorphism. Moreover, we explore obfuscation techniques exploited by metamorphism, the most recent method in malware camouflage. International Journal of Computer Science and Network Security 2012-08 Article PeerReviewed Rad, Babak Bashari and Masrom, Maslin and Ibrahim, Suhaimi (2012) Camouflage in Malware : from encryption to metamorphism. IJCSNS International Journal of Computer Science and Network Security, 12 (8). pp. 74-83. ISSN 1738-7906 http://paper.ijcsns.org/07_book/201208/20120813.pdf |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Rad, Babak Bashari Masrom, Maslin Ibrahim, Suhaimi Camouflage in Malware : from encryption to metamorphism |
description |
Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the process of analyzing and detection prolonged, so the malware can get more time to widely spread. It is very important for antivirus technologies to improve their products by shortening the detection procedure, not only at the first time facing with a new threat, but also in the future detections. In this paper, we intend to review the concept of camouflage in malware and its evolution from non-stealth days to modern metamorphism. Moreover, we explore obfuscation techniques exploited by metamorphism, the most recent method in malware camouflage. |
format |
Article |
author |
Rad, Babak Bashari Masrom, Maslin Ibrahim, Suhaimi |
author_facet |
Rad, Babak Bashari Masrom, Maslin Ibrahim, Suhaimi |
author_sort |
Rad, Babak Bashari |
title |
Camouflage in Malware : from encryption to metamorphism |
title_short |
Camouflage in Malware : from encryption to metamorphism |
title_full |
Camouflage in Malware : from encryption to metamorphism |
title_fullStr |
Camouflage in Malware : from encryption to metamorphism |
title_full_unstemmed |
Camouflage in Malware : from encryption to metamorphism |
title_sort |
camouflage in malware : from encryption to metamorphism |
publisher |
International Journal of Computer Science and Network Security |
publishDate |
2012 |
url |
http://eprints.utm.my/id/eprint/31722/ http://paper.ijcsns.org/07_book/201208/20120813.pdf |
_version_ |
1643648838358007808 |