The Community for Technology Leaders
Green Image
Issue No. 05 - September/October (2011 vol. 9)
ISSN: 1540-7993
pp: 41-47
Sakir Sezer , Centre for Secure Information Technologies, Queen's University Belfast
Kieran McLaughlin , Centre for Secure Information Technologies, Queen's University Belfast
Philip O'Kane , Centre for Secure Information Technologies, Queen's University Belfast
ABSTRACT
A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of malware, undermine antimalware software, and thwart malware analysis. Malware writers use packers, polymorphic techniques, and metamorphic techniques to evade intrusion detection systems. The need exists for new antimalware approaches that focus on what malware is doing rather than how it's doing it.
INDEX TERMS
malware, obfuscation, packer, polymorphism, metamorphism, computer security
CITATION
Sakir Sezer, Kieran McLaughlin, Philip O'Kane, "Obfuscation: The Hidden Malware", IEEE Security & Privacy, vol. 9, no. , pp. 41-47, September/October 2011, doi:10.1109/MSP.2011.98
101 ms
(Ver )