Modeling Evasive Malware Authoring Techniques

Author First name, Last name, Institution

Mathew Nicho, Zayed University
Maitha Alkhateri, Zayed University

Document Type

Conference Proceeding

Source of Publication

2021 5th Cyber Security in Networking Conference (CSNet)

Publication Date

10-14-2021

Abstract

Malware have proliferated due to the ease at which it can be created, sourced, or purchased. Furthermore, with extensive accessibility of obfuscation, binding and crypting tools, infection has become widespread and effortless. While advanced persistent threats (APT) use zero-day malware or near zero day, it has been observed that not all malwares in the wild are zero or near zero day. Hence, in this paper our objective is (1) model malware authoring process, (2) recreate the process of malware authoring by creating 18 malwares using four different commonly used constructor (malware authoring) tools, (3) evaluate the detection rate, and (4) observe if the OS defenses quarantine these payloads. Hence our process involves malware creation, detection, infection, and analysis.

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

Volume

00

Disciplines

Computer Sciences

Keywords

Analytical models, Authoring systems, Tools, Malware, Cryptography, Computer crime, Payloads

Indexed in Scopus

no

Open Access

no

Share

COinS