Skip to main content
Article
Modeling Evasive Malware Authoring Techniques
2021 5th Cyber Security in Networking Conference (CSNet)
  • Mathew Nicho, Zayed University
  • Maitha Alkhateri, Zayed University
Document Type
Conference Proceeding
Publication Date
10-14-2021
Abstract

Malware have proliferated due to the ease at which it can be created, sourced, or purchased. Furthermore, with extensive accessibility of obfuscation, binding and crypting tools, infection has become widespread and effortless. While advanced persistent threats (APT) use zero-day malware or near zero day, it has been observed that not all malwares in the wild are zero or near zero day. Hence, in this paper our objective is (1) model malware authoring process, (2) recreate the process of malware authoring by creating 18 malwares using four different commonly used constructor (malware authoring) tools, (3) evaluate the detection rate, and (4) observe if the OS defenses quarantine these payloads. Hence our process involves malware creation, detection, infection, and analysis.

Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Disciplines
Keywords
  • Analytical models,
  • Authoring systems,
  • Tools,
  • Malware,
  • Cryptography,
  • Computer crime,
  • Payloads
Indexed in Scopus
No
Open Access
No
https://doi.org/10.1109/csnet52717.2021.9614645
Citation Information
Mathew Nicho and Maitha Alkhateri. "Modeling Evasive Malware Authoring Techniques" 2021 5th Cyber Security in Networking Conference (CSNet) Vol. 00 (2021)
Available at: http://works.bepress.com/mathew-nicho/15/