Article review - backdoor obfuscation and evasion techniques

Assignment Help Software Engineering
Reference no: EM132186953

Write article review with 2 APA format references. Hackers with ill-intent, almost by definition, operate under a shroud of deception and concealment. 2 Corinthians 11:13-14 touches on this type of behavior, saying "for such people are false apostles, deceitful workers, masquerading as apostles of Christ. And no wonder, for Satan himself masquerades as an angel of light" (NIV).

The first step to hiding bad programs on a victim's computer, is to bypass their IDS to get it to their computer in the first place. The main techniques to do this are through obfuscation, fragmentation, encryption, or overloading (Del Carlo, 2003). Then, once the content is on the victim's computer, the attacker can use similar techniques to keep it there. According to Cannell (2013), the aim of most of today's malware is to stay hidden during infection and operation to prevent its removal and analysis.

It is able to hide itself using clever techniques, such as obscuring filenames, modifying file attributes, or "operating under the pretense of legitimate programs and services" (Cannell, 2013). Obfuscation is when binary data becomes unreadable and hard to understand. An attacker might do this by hiding any significant strings (URLs or registry keys) or an entire file to further hide the malware's behavior.

Another way attackers do this is by "exclusive or operation" (XOR), however it is easily defeated. Other, more successful, ways to obfuscate data is by base64 encoding, ROT13 (rotate 13), using runtime packers (only able to view code once it is in memory), or can be something as advanced as full-on encryption.

However, its overall motivation is to mask known functions or keywords (Avital & Yehudai, 2018). As it says in Luke 8:17, "for nothing is concealed that won't be revealed, and nothing hidden that won't be made known and brought to light," hidden information cannot hide forever (CSB).

At some point, it will be found and evaluated, despite its best efforts to stay hidden.

References Avital, N. & Yehudai, G. (2018).

The trickster hackers - Backdoor obfuscation and evasion techniques. Impervia.

Cannell, J. (2013). Obfuscation: Malware's best friend. Malwarebytes Labs.

Del Carlo, C. (2003). Intrusion detection evasion: How attackers get past the burglar alarm.

SANS Institute InfoSec Reading Room.

Verified Expert

The present solution is based on a article review of cyber security. The solution is according to the given instruction with more than 100 words.The references used are given in APA format, to the end of the solution. The solution is completely free from plagiarism.

Reference no: EM132186953

Questions Cloud

Important source of economic growth : 1. Growth accounting shows that technological progress is an important source of economic growth.
Create an art piece inspired by your selected art piece : Create an art piece inspired by your selected art piece. Write a one-page reflection about the relationship between your art production and the inspiration.
What would be the firm total revenue : What would be the firm's total revenue when it produces 8 units of output?
Labels on some of the goods in house : 1. Check the tags or labels on some of the goods in your house. List the products you find that were made in China.
Article review - backdoor obfuscation and evasion techniques : Write article review with 2 APA format references. Hackers with ill-intent, almost by definition, operate under a shroud of deception and concealment
Prepare and present plan for your development as leader : The task for this assessment is to prepare and present a plan for your development as a leader.
Explain why poverty in the poor nations is a vicious cycle : Explain why poverty in the poor nations is a vicious cycle.
Prepare a business plan for oriental rug company : prepare a business plan for oriental rug company
Increasing returns ceases and diminishing returns begins : Find the value of Q where increasing returns ceases and diminishing returns begins.

Reviews

Write a Review

Software Engineering Questions & Answers

  Describe the primary sdlc methodologies

The System Development Life Cycle has constructed over the decades to include a variety of Methodologies. Each of these Methodologies utilizes same processes in a different way.

  Why is software quality important in system development

Why is software quality assurance important in system development? What are some of the software quality assurance methods that you would embrace for ensuring quality in the application that you are developing, and why?

  Use the arraylist class to hold instances of the classes

Use the ArrayList class to hold instances of the classes defined in item 1. Be sure to use generics appropriately.

  What are the deliverables of the specification phase

What are the main parts of the SRS document recommended by IEEE? What are the deliverables of the specification phase? List the possible uses of the FSM model.

  Sketch the eer diagram for unique number and single location

A department controls number of projects, each of which has unique name, unique number, and a single location. Sketch the EER Diagram for this situation.

  What are the goals of structured systems analysis

What are the goals of structured systems analysis?- Why do we study and document the current physical environment?- Why do we develop a current logical model of an Information System?

  Define a set of requirements for business case

Define a set of requirements for business case, given the details above, and design a user interface for the website that fits the business model

  Tracing speakers for a national conference

You are working on a database that will track speakers for a national conference. The data entry person entered information in the Speakers table incorrectly. He entered the first half of a new record cor¬rectly, but then jumped to a different rec..

  Describes the mode of working of the java programs

ITEC 6670 - describes the mode of working of the Java programs that you will be testing during this course - Count the number of characters, numeric digits

  Aperformance engineer or a developer or a dba

Current course or workplace would be like for example I am a Software Engineer working as a Performance Engineer or a developer or a DBA. The paper should describe the work a person does in an IT field. Paper should not contain any Plagiarism.

  Task no1 cultural differencecultural comparisonsselect one

task no.1 cultural differencecultural comparisonsselect one other country and make a comparison with your own

  List six phases of system development life cycle in order

List the six phases of the System Development Life Cycle (SDLC) in order. For each phase, describe three tasks that occur during that phase.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd