Malware Analysis and Detection Engineering 2020
DOI: 10.1007/978-1-4842-6193-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Code Injection, Process Hollowing, and API Hooking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Once executed, the malware itself can use several well-known techniques to avoid runtime detection [11], [43], [59]. Evading runtime detection is orthogonal to our work, and interested readers are referred to relevant related works [47], [58].…”
Section: Self-extraction and Executionmentioning
confidence: 99%
“…Once executed, the malware itself can use several well-known techniques to avoid runtime detection [11], [43], [59]. Evading runtime detection is orthogonal to our work, and interested readers are referred to relevant related works [47], [58].…”
Section: Self-extraction and Executionmentioning
confidence: 99%
“…Nevertheless, an operating system as a milieu does not sufficiently protect the individual running process of an application from the harmful behavior of malware. Stealth malware often employs a technique called 'process injection' to inject malicious code into a running process (Monnappa, 2018). 3 Once it lands in a target Windows machine, malware can use legitimate APIs provided by Windows to inject malicious code into the memory space of a running application and to execute that code.…”
Section: Study Of a Malware Infection Attackmentioning
confidence: 99%