Malware Engineering
نویسندگان
چکیده
Starting from simple hand-crafted viruses, today’s malware has evolved to constitute highly infectious computer diseases. The technical development of malware was mainly driven by the wish to improve and accelerate both attacks and proliferation. Although these programs have incurred significant hazard and financial losses, their mechanisms are relatively simple and are amenable to effective countermeasures— once, the first attack has been launched. From a software technology point of view, malicious software in fact is often very similar to network services with the main difference that security holes are exploited to enforce participation in the protocol. In this position paper we outline the wide range of possible malware-specific engineering techniques which are not used in known viruses and worms, but are technically feasible and will therefore be realized in the foreseeable future—less likely by hackers than by organized illegal entities. The techniques we describe enable the malware to obfuscate its functionality, monitor and analyze its environment, and modify or extend itself in non-trivial ways. Consequently, future security policies and risk assessments have to account for these new classes of malware. WE ARE THEIR FOOD. THOSE GERMS OF THE PAST THAT BEST CONVERTED OUR BODIES INTO THEIR OWN PROPAGATION ARE THE GERMS OF THE PRESENT. THOSE GERMS OF THE PRESENT THAT BEST CONVERT OUR BODIES INTO THEIR OWN PROPAGATION ARE THE GERMS OF THE FUTURE. Paul W. Ewald [Ewa00]
منابع مشابه
Survey on Malware Detection Methods
Malwares are malignant software’s .It is designed to damage computer systems without the knowledge of the owner using the system. Software’s from reputable vendors also contain malicious code that affects the system or leaks information’s to remote servers.Malware’s includes computer viruses, spyware, dihonest ad-ware,rootkits,Trojans,dialers etc. The paper focuses on various Malware detection ...
متن کاملReverse Engineering
This paper provides the basic information about Reverse Software Engineering and its advantages and disadvantages of Reverse Engineering. Today Reverse Engineering is used in many fields of Information Technology in form of Legacy compatibility, Malware Analysis, Network Analysis, Binary code patching, debugging, and improvising existing algorithms, rapid prototyping and even software reusabili...
متن کاملAutomated Reverse Engineering Tool
: Network security plays an increasingly important role in technology. As the world gets more and more interconnected, the need for security increases. While there are several tools that offer a fair amount of security, it is still crucial that students are educated well on the design and operation of malware, and learn to develop countermeasures that prevent malicious activity. To assist in th...
متن کاملAssembly Code Clone Detection for Malware Binaries
Assembly Code Clone Detection for Malware Binaries Mohammad Reza Farhadi Malware, such as a virus or trojan horse, refers to software designed specifically to gain unauthorized access to a computer system and perform malicious activities. To analyze a piece of malware, one may employ a reverse engineering approach to perform an in-depth analysis on the assembly code of a malware. Yet, the rever...
متن کاملRotalumè: A Tool for Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated instruction set and paired with a native binary emulator that interprets the bytecode. No existing malware analysis can reliably reverse this obfuscation technique. In this paper, we present the first work in automati...
متن کاملOn the Reverse Engineering of the Citadel Botnet
Citadel is an advanced information stealing malware that targets financial information. This malware poses a real threat against the confidentiality and integrity of personal and business data. Recently, a joint operation has been conducted by FBI and Microsoft Digital Crimes Unit in order to take down Citadel command-and-control servers. The operation caused some disruption in the botnet but h...
متن کامل