Article review - backdoor obfuscation and evasion techniques

Assignment Help Software Engineering
Reference no: EM132186953

Write article review with 2 APA format references. Hackers with ill-intent, almost by definition, operate under a shroud of deception and concealment. 2 Corinthians 11:13-14 touches on this type of behavior, saying "for such people are false apostles, deceitful workers, masquerading as apostles of Christ. And no wonder, for Satan himself masquerades as an angel of light" (NIV).

The first step to hiding bad programs on a victim's computer, is to bypass their IDS to get it to their computer in the first place. The main techniques to do this are through obfuscation, fragmentation, encryption, or overloading (Del Carlo, 2003). Then, once the content is on the victim's computer, the attacker can use similar techniques to keep it there. According to Cannell (2013), the aim of most of today's malware is to stay hidden during infection and operation to prevent its removal and analysis.

It is able to hide itself using clever techniques, such as obscuring filenames, modifying file attributes, or "operating under the pretense of legitimate programs and services" (Cannell, 2013). Obfuscation is when binary data becomes unreadable and hard to understand. An attacker might do this by hiding any significant strings (URLs or registry keys) or an entire file to further hide the malware's behavior.

Another way attackers do this is by "exclusive or operation" (XOR), however it is easily defeated. Other, more successful, ways to obfuscate data is by base64 encoding, ROT13 (rotate 13), using runtime packers (only able to view code once it is in memory), or can be something as advanced as full-on encryption.

However, its overall motivation is to mask known functions or keywords (Avital & Yehudai, 2018). As it says in Luke 8:17, "for nothing is concealed that won't be revealed, and nothing hidden that won't be made known and brought to light," hidden information cannot hide forever (CSB).

At some point, it will be found and evaluated, despite its best efforts to stay hidden.

References Avital, N. & Yehudai, G. (2018).

The trickster hackers - Backdoor obfuscation and evasion techniques. Impervia.

Cannell, J. (2013). Obfuscation: Malware's best friend. Malwarebytes Labs.

Del Carlo, C. (2003). Intrusion detection evasion: How attackers get past the burglar alarm.

SANS Institute InfoSec Reading Room.

Verified Expert

The present solution is based on a article review of cyber security. The solution is according to the given instruction with more than 100 words.The references used are given in APA format, to the end of the solution. The solution is completely free from plagiarism.

Reference no: EM132186953

Questions Cloud

Important source of economic growth : 1. Growth accounting shows that technological progress is an important source of economic growth.
Create an art piece inspired by your selected art piece : Create an art piece inspired by your selected art piece. Write a one-page reflection about the relationship between your art production and the inspiration.
What would be the firm total revenue : What would be the firm's total revenue when it produces 8 units of output?
Labels on some of the goods in house : 1. Check the tags or labels on some of the goods in your house. List the products you find that were made in China.
Article review - backdoor obfuscation and evasion techniques : Write article review with 2 APA format references. Hackers with ill-intent, almost by definition, operate under a shroud of deception and concealment
Prepare and present plan for your development as leader : The task for this assessment is to prepare and present a plan for your development as a leader.
Explain why poverty in the poor nations is a vicious cycle : Explain why poverty in the poor nations is a vicious cycle.
Prepare a business plan for oriental rug company : prepare a business plan for oriental rug company
Increasing returns ceases and diminishing returns begins : Find the value of Q where increasing returns ceases and diminishing returns begins.

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd