Article review - backdoor obfuscation and evasion techniques

Assignment Help Software Engineering
Reference no: EM132186953

Write article review with 2 APA format references. Hackers with ill-intent, almost by definition, operate under a shroud of deception and concealment. 2 Corinthians 11:13-14 touches on this type of behavior, saying "for such people are false apostles, deceitful workers, masquerading as apostles of Christ. And no wonder, for Satan himself masquerades as an angel of light" (NIV).

The first step to hiding bad programs on a victim's computer, is to bypass their IDS to get it to their computer in the first place. The main techniques to do this are through obfuscation, fragmentation, encryption, or overloading (Del Carlo, 2003). Then, once the content is on the victim's computer, the attacker can use similar techniques to keep it there. According to Cannell (2013), the aim of most of today's malware is to stay hidden during infection and operation to prevent its removal and analysis.

It is able to hide itself using clever techniques, such as obscuring filenames, modifying file attributes, or "operating under the pretense of legitimate programs and services" (Cannell, 2013). Obfuscation is when binary data becomes unreadable and hard to understand. An attacker might do this by hiding any significant strings (URLs or registry keys) or an entire file to further hide the malware's behavior.

Another way attackers do this is by "exclusive or operation" (XOR), however it is easily defeated. Other, more successful, ways to obfuscate data is by base64 encoding, ROT13 (rotate 13), using runtime packers (only able to view code once it is in memory), or can be something as advanced as full-on encryption.

However, its overall motivation is to mask known functions or keywords (Avital & Yehudai, 2018). As it says in Luke 8:17, "for nothing is concealed that won't be revealed, and nothing hidden that won't be made known and brought to light," hidden information cannot hide forever (CSB).

At some point, it will be found and evaluated, despite its best efforts to stay hidden.

References Avital, N. & Yehudai, G. (2018).

The trickster hackers - Backdoor obfuscation and evasion techniques. Impervia.

Cannell, J. (2013). Obfuscation: Malware's best friend. Malwarebytes Labs.

Del Carlo, C. (2003). Intrusion detection evasion: How attackers get past the burglar alarm.

SANS Institute InfoSec Reading Room.

Verified Expert

The present solution is based on a article review of cyber security. The solution is according to the given instruction with more than 100 words.The references used are given in APA format, to the end of the solution. The solution is completely free from plagiarism.

Reference no: EM132186953

Questions Cloud

Important source of economic growth : 1. Growth accounting shows that technological progress is an important source of economic growth.
Create an art piece inspired by your selected art piece : Create an art piece inspired by your selected art piece. Write a one-page reflection about the relationship between your art production and the inspiration.
What would be the firm total revenue : What would be the firm's total revenue when it produces 8 units of output?
Labels on some of the goods in house : 1. Check the tags or labels on some of the goods in your house. List the products you find that were made in China.
Article review - backdoor obfuscation and evasion techniques : Write article review with 2 APA format references. Hackers with ill-intent, almost by definition, operate under a shroud of deception and concealment
Prepare and present plan for your development as leader : The task for this assessment is to prepare and present a plan for your development as a leader.
Explain why poverty in the poor nations is a vicious cycle : Explain why poverty in the poor nations is a vicious cycle.
Prepare a business plan for oriental rug company : prepare a business plan for oriental rug company
Increasing returns ceases and diminishing returns begins : Find the value of Q where increasing returns ceases and diminishing returns begins.

Reviews

Write a Review

 

Software Engineering Questions & Answers

  Highlight the software configuration management activities

Highlight the software configuration management activities.

  Explain the effectiveness of the system

Identify the problems that appear to exist in Ferguson & Son Manufacturing Company's budgetary control system and explain how the problems are likely to reduce the effectiveness of the system.

  Algorithm to create an increasing sequence of integers

Create an algorithm to generate the sequence of positive integers in rising order whose only prime divisors are 2 and 3; that is, your program should manufacture the sequence.

  Explain type of class that is represented by machine diagram

Describe the type of class that is best represented by a behavioral state machine diagram. Give two examples of classes that would be good candidates for behavioral state machine diagrams.

  Planning and budgeting methods are notorious for their

question 1 planning and budgeting processes are notorious for their rigidity and irrelevance to management action. how

  Write reply - idea of a kill switch

This idea of a kill switch seems like it is taking us further in that direction by offering more control of the population.

  Why is defining the proper scope for a project so important

Why is defining the proper scope for a project so important? What are the dangers a project can face if the scope is not tied down

  Determine its model for attorney of clients for each case

Attorney is retained by one or more clients for each case, a client may have more than one attorney for each case. Determine its model.

  Review article - cyber security vulnerabilities

Identify attacks that happen on hosts of that particular network - technology continues to advance at an alarming pace and with it an increase in the amount

  Describing the judgmental or commonsense part of problem

What stage of the manufacturing process has been described as "the mapping of function onto form"?What is the term used for describing the judgmental or commonsense part of problem solving?

  1 consider the following balance sheeta how does this

1. consider the following balance sheeta. how does this balance sheet differ from the one presented in your

  Create a use case based on relating functional requirements

Create a use case based on relating functional requirements. Analyze ethical, cultural, and legal issues and their feasibilities among alternative solutions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd