Increasingly, most of the modern malware are staged ones in order for them to be not detected by antivirus solutions at the early stage of intrusion. The common strategies deployed include the use of obfuscated code and staged malware whose first instance (usually installer such as dropper and downloader) is not detected by the antivirus software. This has led to malware that can bypass or subvert antivirus software. In the anti-malware research community, development of techniques for evading detection by antivirus software is an active research area. SUMMARY The security of modern computer systems heavily depends on security tools, especially on antivirus software solutions. Finally, we discuss the defensive implications of our work, and future directions of research in emulator evasion and exploitation. We also propose a classification of fingerprints as they apply to consumer AV emu-lators. We present an evaluation of AVLeak against several current consumer AVs and show emulator fingerprints derived from our experimentation. To demonstrate our technique, we implemented an easy-to-use tool and API called AVLeak. We propose a novel black-box technique to efficiently extract emulator fingerprints without reverse-engineering. As an alternative, researchers have demonstrated fingerprinting attacks using simple black-box testing, but these techniques are slow, inefficient, and generally awkward to use. Due to their immense complexity and the expert knowledge required to effectively analyze them, reverse-engineering AV emulators to discover fingerprints is an extremely challenging task. Malware may detect emulation by looking for emulator " fingerprints " such as unique environmental values, timing inconsistencies, or bugs in CPU emulation. Malware authors have responded by creating malware that attempts to evade detection by behaving benignly while running in an emulator. To fight the ever-increasing proliferation of novel mal-ware, antivirus (AV) vendors have turned to emulation-based automated dynamic malware analysis. The study is followed by the sensitivity analyses of the results which also gives valuable insights into the needs and solutions for different users in different conditions. Seven alternatives were selected from among the most popular antiviruses in the market and seven criteria were determined by the experts. We study a real world case of antivirus software and define criteria for antivirus selection problem. This paper proposes an antivirus evaluation model for computer users based on group fuzzy TOPSIS. The anti-virus selection problem can be formulated as a multiple criteria decision making problem. In the competitive IT environment, due to availability of many antivirus software and their diverse features evaluating them is an arguable and complicated issue for users which has a significant impact on the efficiency of computers defense systems. Antivirus software is a device to prevent, discover, and eliminatemalwares such as, computer worm, trojan horses,computer viruses,spyware and adware. In today's interconnected world, the risk of malwares is a major concern for users. Keywords: Encryption, Confidentiality, Data security, Forensics, Privacy, BitLocker, BitDefender. We show how failures in their development, commercial inconsistencies and poor implementation can compromise the privacy and information security. We were able to prove that outdated concepts are still being used to protect the information and guarantee the privacy. Our work has evolved to an analysis of two existing consecrated encryption systems on the market: Bitlocker (Microsoft) and Bit Defender Total Encryption 2015 (Bitdefender). It is noteworthy that many mobile devices are stolen each year and with that, information confidentiality of company’s strategic information confidential can be compromised. When businesspersons travel, they transport sensitive company data among offices, cities and even countries. By Rogério Winter, Brazilian Army – Cyber Defense and Rodrigo Ruiz, Center for Information Technology Renato Archer (CTI) The security of information has grown in importance worldwide.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |