Evasive Windows Malware: Impact on Antiviruses and Possible Countermeasures

09/25/2020
by   Cédric Herzog, et al.
0

The perpetual opposition between antiviruses and malware leads both parties to evolve continuously. On the one hand, antiviruses put in place solutions that are more and more sophisticated and propose more complex detection techniques in addition to the classic signature analysis. This sophistication leads antiviruses to leave more traces of their presence on the machine they protect. To remain undetected as long as possible, malware can avoid executing within such environments by hunting down the modifications left by the antiviruses. This paper aims at determining the possibilities for malware to detect the antiviruses and then evaluating the efficiency of these techniques on a panel of antiviruses that are the most used nowadays. We then collect samples showing this kind of behavior and propose to evaluate a countermeasure that creates false artifacts, thus forcing malware to evade.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/05/2021

Advances In Malware Detection- An Overview

Malware has become a widely used means in cyber attacks in recent decade...
research
06/10/2021

Towards an Automated Pipeline for Detecting and Classifying Malware through Machine Learning

The constant growth in the number of malware - software or code fragment...
research
06/14/2019

Antiforensic techniques deployed by custom developed malware in evading anti-virus detection

Both malware and antivirus detection tools advance in their capabilities...
research
11/27/2021

Assessing the Effectiveness of YARA Rules for Signature-Based Malware Detection and Classification

Malware often uses obfuscation techniques or is modified slightly to eva...
research
12/09/2022

A Bayesian Model Combination-based approach to Active Malware Analysis

Active Malware Analysis involves modeling malware behavior by executing ...
research
06/27/2023

Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access

We investigate the criminal market dynamics of infostealer malware and p...
research
06/27/2019

A New Malware Detection System Using a High Performance-ELM method

A vital element of a cyberspace infrastructure is cybersecurity. Many pr...

Please sign up or login with your details

Forgot password? Click here to reset