Issue No. 05 - September/October (2011 vol. 9)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2011.98
Philip O'Kane , Centre for Secure Information Technologies, Queen's University Belfast
Sakir Sezer , Centre for Secure Information Technologies, Queen's University Belfast
Kieran McLaughlin , Centre for Secure Information Technologies, Queen's University Belfast
A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of malware, undermine antimalware software, and thwart malware analysis. Malware writers use packers, polymorphic techniques, and metamorphic techniques to evade intrusion detection systems. The need exists for new antimalware approaches that focus on what malware is doing rather than how it's doing it.
malware, obfuscation, packer, polymorphism, metamorphism, computer security
S. Sezer, K. McLaughlin and P. O'Kane, "Obfuscation: The Hidden Malware," in IEEE Security & Privacy, vol. 9, no. , pp. 41-47, 2011.