Obfuscation procedure based on the insertion of the dead code in the crypter by binary search

Cristian Barría Huidobro, David Cordero, Claudio Cubillos, Héctor Allende Cid, Claudio Casado Bárragan

Resultado de la investigación: Contribución a los tipos de informe/libroContribución a la conferencia

Resumen

What threatens the cyberspace is known as malware, which in order to infect the technological devices, it has to be capable of bypassing the antivirus motor. To avoid the antivirus detection, the malicious code requires to be updated and have undergone an obfuscation process. However, the problem of the updating is to consider that the malware maintains its functionality based on its specific characteristics, and also to be checked by specilized informatic resources. For the aforementioned, this paper proposes a procedure that allows to apply the AVFUCKER, DSPLIT, and Binary Division techniques with the aim of optimizing the necessary technological resources, and reducing the time of analysis of the malware's functionality and the evasion of the antivirus.

Idioma originalInglés
Título de la publicación alojada2018 7th International Conference on Computers Communications and Control, ICCCC 2018 - Proceedings
EditorialInstitute of Electrical and Electronics Engineers Inc.
Páginas183-192
Número de páginas10
ISBN (versión digital)9781538619346
DOI
EstadoPublicada - 19 jun 2018
Publicado de forma externa
Evento7th International Conference on Computers Communications and Control, ICCCC 2018 - Oradea, Rumanía
Duración: 8 may 201812 may 2018

Conferencia

Conferencia7th International Conference on Computers Communications and Control, ICCCC 2018
PaísRumanía
CiudadOradea
Período8/05/1812/05/18

Áreas temáticas de ASJC Scopus

  • Redes de ordenadores y comunicaciones
  • Hardware y arquitectura
  • Software
  • Ingeniería energética y tecnologías de la energía
  • Control y optimización

Huella Profundice en los temas de investigación de 'Obfuscation procedure based on the insertion of the dead code in the crypter by binary search'. En conjunto forman una huella única.

  • Citar esto

    Huidobro, C. B., Cordero, D., Cubillos, C., Cid, H. A., & Bárragan, C. C. (2018). Obfuscation procedure based on the insertion of the dead code in the crypter by binary search. En 2018 7th International Conference on Computers Communications and Control, ICCCC 2018 - Proceedings (pp. 183-192). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICCCC.2018.8390457