Camouflage in Malware : from encryption to metamorphism

Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the mal...

Full description

Saved in:
Bibliographic Details
Main Authors: Rad, Babak Bashari, Masrom, Maslin, Ibrahim, Suhaimi
Format: Article
Published: International Journal of Computer Science and Network Security 2012
Subjects:
Online Access:http://eprints.utm.my/id/eprint/31722/
http://paper.ijcsns.org/07_book/201208/20120813.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.31722
record_format eprints
spelling my.utm.317222019-03-05T02:03:45Z http://eprints.utm.my/id/eprint/31722/ Camouflage in Malware : from encryption to metamorphism Rad, Babak Bashari Masrom, Maslin Ibrahim, Suhaimi QA75 Electronic computers. Computer science Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the process of analyzing and detection prolonged, so the malware can get more time to widely spread. It is very important for antivirus technologies to improve their products by shortening the detection procedure, not only at the first time facing with a new threat, but also in the future detections. In this paper, we intend to review the concept of camouflage in malware and its evolution from non-stealth days to modern metamorphism. Moreover, we explore obfuscation techniques exploited by metamorphism, the most recent method in malware camouflage. International Journal of Computer Science and Network Security 2012-08 Article PeerReviewed Rad, Babak Bashari and Masrom, Maslin and Ibrahim, Suhaimi (2012) Camouflage in Malware : from encryption to metamorphism. IJCSNS International Journal of Computer Science and Network Security, 12 (8). pp. 74-83. ISSN 1738-7906 http://paper.ijcsns.org/07_book/201208/20120813.pdf
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Rad, Babak Bashari
Masrom, Maslin
Ibrahim, Suhaimi
Camouflage in Malware : from encryption to metamorphism
description Camouflage of malware is a serious challenge for antivirus experts and code analysts. Malware use various techniques to camouflage them to not be easily visible and make their lifetime as longer as possible. Although, camouflage approaches cannot fully stop the analyzing and fighting against the malware, but it make the process of analyzing and detection prolonged, so the malware can get more time to widely spread. It is very important for antivirus technologies to improve their products by shortening the detection procedure, not only at the first time facing with a new threat, but also in the future detections. In this paper, we intend to review the concept of camouflage in malware and its evolution from non-stealth days to modern metamorphism. Moreover, we explore obfuscation techniques exploited by metamorphism, the most recent method in malware camouflage.
format Article
author Rad, Babak Bashari
Masrom, Maslin
Ibrahim, Suhaimi
author_facet Rad, Babak Bashari
Masrom, Maslin
Ibrahim, Suhaimi
author_sort Rad, Babak Bashari
title Camouflage in Malware : from encryption to metamorphism
title_short Camouflage in Malware : from encryption to metamorphism
title_full Camouflage in Malware : from encryption to metamorphism
title_fullStr Camouflage in Malware : from encryption to metamorphism
title_full_unstemmed Camouflage in Malware : from encryption to metamorphism
title_sort camouflage in malware : from encryption to metamorphism
publisher International Journal of Computer Science and Network Security
publishDate 2012
url http://eprints.utm.my/id/eprint/31722/
http://paper.ijcsns.org/07_book/201208/20120813.pdf
_version_ 1643648838358007808