First Step Towards Modeling Unbreakable Malware

08/14/2020
by   Tiantian Ji, et al.
0

Currently, the construction of concealed malicious code has become a trend, and attackers try to use this to hide their attack intentions. However, the building of stealthy malware is still unable to counter the reverse analysis of security experts. In response to this problem, this paper models a class of malware with "unbreakable" security attributes–UBM (UnBreakable Malware). We have systematically studied such threats from models, methods, experiments, evaluations, and defenses. Specifically, first, we conducted a formal definition and security attribute research on UBM. We proposed two key characteristics that must be met in order to achieve "unbreakable" security attributes and their corresponding evaluation quaternions. Second, we summarized and implemented four algorithms that can be used to construct UBM, and verified the "unhackable" security attributes based on the evaluation of the two key features. Furthermore, we completed the construction of UBM using the implementation of four verified algorithms and proved the practical applicability of UBM by calculating the volume increment and analyzing the actual counter defense capabilities. Finally, for UBM, a new threat to cyberspace, this article discusses possible defense measures and hopes to promote the establishment of a corresponding defense system.

READ FULL TEXT

page 4

page 9

research
11/27/2021

Evading Malware Analysis Using Reverse Execution

Malware is a security threat, and various means are adapted to detect an...
research
06/30/2020

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

Malware remains a big threat to cyber security, calling for machine lear...
research
05/24/2020

SoK: Arms Race in Adversarial Malware Detection

Malicious software (malware) is a major cyber threat that shall be tackl...
research
02/26/2020

Exploitation of Human Trust, Curiosity and Ignorance by Malware

Despite defensive advances in the Internet realm, Malware (malicious sof...
research
04/04/2021

Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown

The malware and botnet phenomenon is among the most significant threats ...
research
12/10/2022

A systematic literature review on insider threats

Insider threats is the most concerned cybersecurity problem which is poo...
research
08/05/2019

On the security of ballot marking devices

A recent debate among election experts has considered whether electronic...

Please sign up or login with your details

Forgot password? Click here to reset