Antivirus Evasion Methods in Modern Operating Systems

نویسندگان

چکیده

In order to safeguard one’s privacy while accessing the internet, it is crucial have an antivirus program installed on device. Despite their usefulness in protecting against malware, these programs are not foolproof. Cybercriminals access numerous techniques and tools for circumventing software, which can greatly aid them illicit activities. The objective of this research was examine most prevalent methods bypassing software demonstrate how readily accessible simple they use. aim paper raise awareness among readers about associated risks assist internet users themselves from potential threats. findings indicate that efficacy evasion positively correlated with age popularity. Tests shown that, latest updates, contemporary capable resisting virtually all tested generated using default settings. However, significant aspect section presenting experiments basic but powerful modifications established mechanisms, been found deceive modern, up-to-date software.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modern Operating Systems

ion is the key to managing complexity. Good abstractions turn a nearly impossible task into two manageable ones. The first one of these is defining and^aglementing the abstractions. The second one is using these abstractions to sol^He problem at hand. One abstraction that almost every computer user understands is the file. It is a useful piece of information, such as a digital photo, SEC. 1.1 W...

متن کامل

Shrinking the Ocean: Formalizing I/O Methods Modern Operating Systems

Currently, it is not practical for any single software system to perform forensically acceptable verification of the contents of all possible file systems on a disk, let alone the contents of more esoteric peripherals. Recent court decisions that require judges to restrict testimony based on their understanding of the validity of the science behind it will only make such verification even more ...

متن کامل

Soundmodem on modern Operating Systems

Five years ago I presented drivers for using standard PC’s with soundcards as packet radio modems [13]. The mainstream CPUs of that era were not quite powerful enough for complex signal processing, so the design at that time had to trade robustness for computational simplicity. Futhermore, operating system preferences have changed since. It is therefore time to rethink the design. In this artic...

متن کامل

ROPInjector: Using Return Oriented Programming for Polymorphism and Antivirus Evasion

The downside of current polymorphism techniques lies to the fact that they require a writeable code section, either marked as such in the corresponding Portable Executable (PE) section header, or by changing permissions during runtime. Both approaches are identified by AV software as alarming characteristics and/or behavior, since they are rarely found in benign PEs unless they are packed. In t...

متن کامل

PolyPack: An Automated Online Packing Service for Optimal Antivirus Evasion

Packers have long been a valuable tool in the toolbox of offensive users for evading the detection capabilities of signature-based antivirus engines. However, selecting the packer that results in the most effective evasion of antivirus engines may not be a trivial task due to diversity in the capabilities of both antivirus and packers. In this paper, we propose the creation of an online automat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13085083