Developing a K-ary malware using Blockchain

04/04/2018
by   Joanna Moubarak, et al.
0

Cyberattacks are nowadays moving rapidly. They are customized, multi-vector, staged in multiple flows and targeted. Moreover, new hacking playgrounds appeared to reach mobile network, modern architectures and smart cities. For that purpose, malware use different entry points and plug-ins. In addition, they are now deploying several techniques for obfuscation, camouflage and analysis resistance. On the other hand, antiviral protections are positioning innovative approaches exposing malicious indicators and anomalies, revealing assumptions of the limitations of the anti-antiviral mechanisms. Primarily, this paper exposes a state of art in computer virology and then introduces a new concept to create undetectable malware based on the blockchain technology. It summarizes techniques adopted by malicious software to avoid functionalities implemented for viral detection and presents the implementation of new viral techniques that leverage the blockchain network.

READ FULL TEXT
research
10/13/2022

SoK: How Not to Architect Your Next-Generation TEE Malware?

Besides Intel's SGX technology, there are long-running discussions on ho...
research
09/19/2020

Optimizing Away JavaScript Obfuscation

JavaScript is a popular attack vector for releasing malicious payloads o...
research
06/12/2019

A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores

The dramatic growth in smartphone malware shows that malicious program d...
research
02/26/2021

IoTMalware: Android IoT Malware Detection based on Deep Neural Network and Blockchain Technology

The Internet of Things (IoT) has been revolutionizing this world by intr...
research
09/20/2021

A proactive malicious software identification approach for digital forensic examiners

Digital investigators often get involved with cases, which seemingly poi...
research
01/05/2022

Comprehensive Efficiency Analysis of Machine Learning Algorithms for Developing Hardware-Based Cybersecurity Countermeasures

Modern computing systems have led cyber adversaries to create more sophi...
research
07/19/2018

Emulating malware authors for proactive protection using GANs over a distributed image visualization of dynamic file behavior

Malware authors have always been at an advantage of being able to advers...

Please sign up or login with your details

Forgot password? Click here to reset