2010 5th International Conference on Malicious and Unwanted Software 2010
DOI: 10.1109/malware.2010.5665788
|View full text |Cite
|
Sign up to set email alerts
|

Multi-stage delivery of malware

Abstract: Malware signature detectors use patterns of bytes, or variations of patterns of bytes, to detect malware attempting to enter a systems. This approach assumes the signatures are both or sufficient length to identify the malware, and to distinguish it from non-malware objects entering the system. We describe a technique that can increase the difficulty of both to an arbitrary degree. This technique can exploit an optimization that many anti-virus systems use to make inserting the malware simple; fortunately, thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 11 publications
0
13
0
Order By: Relevance
“…In some attacks, the document contains the complete malware payload the attacker wishes to deploy, while in others, the document only has enough code to download additional malware components [19,25,9,27]. Although exploitation of the reader program can result in the viewer program hanging or crashing, potentially alerting the user of a problem, sometimes such faults remain hidden from the end-user because the reader program is used as plug-in in a larger program, such as Internet browsers [11,5,17,3].…”
Section: Introductionmentioning
confidence: 99%
“…In some attacks, the document contains the complete malware payload the attacker wishes to deploy, while in others, the document only has enough code to download additional malware components [19,25,9,27]. Although exploitation of the reader program can result in the viewer program hanging or crashing, potentially alerting the user of a problem, sometimes such faults remain hidden from the end-user because the reader program is used as plug-in in a larger program, such as Internet browsers [11,5,17,3].…”
Section: Introductionmentioning
confidence: 99%
“…This sleeper code can be activated anytime to alter or destroy information. Similar stealth methodologies are also employed during multistage delivery of malware discussed in [35] and the botnet's stealthy command and control execution model in [15].…”
Section: Advanced Persistent Threatsmentioning
confidence: 99%
“…They use deception to hide from detection while gradually gaining more privileges and information about the system. Such attacks are extremely dangerous and need innovative defense [35].…”
Section: Advanced Persistent Threatsmentioning
confidence: 99%
“…Malware has emerged as a challenging threat with the increased infection rates and levels of sophistication [1][2][3]. Examples of such threats include data exfiltration [4], denial-of-service attacks [5], and espionage [6], among many others.…”
Section: Introductionmentioning
confidence: 99%
“…This is achievable even when limiting the number of features below a quantity commonly used in the related literature. 3…”
Section: Introductionmentioning
confidence: 99%