Article review - backdoor obfuscation and evasion techniques

Assignment Help Software Engineering
Reference no: EM132186953

Write article review with 2 APA format references. Hackers with ill-intent, almost by definition, operate under a shroud of deception and concealment. 2 Corinthians 11:13-14 touches on this type of behavior, saying "for such people are false apostles, deceitful workers, masquerading as apostles of Christ. And no wonder, for Satan himself masquerades as an angel of light" (NIV).

The first step to hiding bad programs on a victim's computer, is to bypass their IDS to get it to their computer in the first place. The main techniques to do this are through obfuscation, fragmentation, encryption, or overloading (Del Carlo, 2003). Then, once the content is on the victim's computer, the attacker can use similar techniques to keep it there. According to Cannell (2013), the aim of most of today's malware is to stay hidden during infection and operation to prevent its removal and analysis.

It is able to hide itself using clever techniques, such as obscuring filenames, modifying file attributes, or "operating under the pretense of legitimate programs and services" (Cannell, 2013). Obfuscation is when binary data becomes unreadable and hard to understand. An attacker might do this by hiding any significant strings (URLs or registry keys) or an entire file to further hide the malware's behavior.

Another way attackers do this is by "exclusive or operation" (XOR), however it is easily defeated. Other, more successful, ways to obfuscate data is by base64 encoding, ROT13 (rotate 13), using runtime packers (only able to view code once it is in memory), or can be something as advanced as full-on encryption.

However, its overall motivation is to mask known functions or keywords (Avital & Yehudai, 2018). As it says in Luke 8:17, "for nothing is concealed that won't be revealed, and nothing hidden that won't be made known and brought to light," hidden information cannot hide forever (CSB).

At some point, it will be found and evaluated, despite its best efforts to stay hidden.

References Avital, N. & Yehudai, G. (2018).

The trickster hackers - Backdoor obfuscation and evasion techniques. Impervia.

Cannell, J. (2013). Obfuscation: Malware's best friend. Malwarebytes Labs.

Del Carlo, C. (2003). Intrusion detection evasion: How attackers get past the burglar alarm.

SANS Institute InfoSec Reading Room.

Verified Expert

The present solution is based on a article review of cyber security. The solution is according to the given instruction with more than 100 words.The references used are given in APA format, to the end of the solution. The solution is completely free from plagiarism.

Reference no: EM132186953

Questions Cloud

Important source of economic growth : 1. Growth accounting shows that technological progress is an important source of economic growth.
Create an art piece inspired by your selected art piece : Create an art piece inspired by your selected art piece. Write a one-page reflection about the relationship between your art production and the inspiration.
What would be the firm total revenue : What would be the firm's total revenue when it produces 8 units of output?
Labels on some of the goods in house : 1. Check the tags or labels on some of the goods in your house. List the products you find that were made in China.
Article review - backdoor obfuscation and evasion techniques : Write article review with 2 APA format references. Hackers with ill-intent, almost by definition, operate under a shroud of deception and concealment
Prepare and present plan for your development as leader : The task for this assessment is to prepare and present a plan for your development as a leader.
Explain why poverty in the poor nations is a vicious cycle : Explain why poverty in the poor nations is a vicious cycle.
Prepare a business plan for oriental rug company : prepare a business plan for oriental rug company
Increasing returns ceases and diminishing returns begins : Find the value of Q where increasing returns ceases and diminishing returns begins.

Reviews

Write a Review

Software Engineering Questions & Answers

  One of the most fascinating features of the global economy

one of the most fascinating features of the global economy is that governments have such different ideas about what

  Plan the testing required for the system

Plan the testing required for the system. You should consider unit, integration, and system testing in your test plan and determine who should participate in the testing.

  Sales transactions and manage inventory

Suppose you were a business analyst developing a new information system to automate the sales transactions and manage inventory for each retail store in a large chain

  Develop a contingency plan to mitigate risk for this event

Where should staff meet in the event the network is not accessible? Who has the authority to initiate a contingency plan

  Content validation of document

Do you believe that any form of document content validation should be applied to web pages before they are placed in the public domain?

  Another cipher

Another cipher, which has been historically used by the Freemasons, is removing all the vowels from a word. Write a function string removevowels(string s) that returns a copy of the string s, with vowels removed. For example, can you guess what was s..

  Software services versus software components

Consider a legacy system and explain how services could be used to implement wrappers to provide access to the system functionality and data for applications built with modern technologies.

  Why is it important for an organization to have formal sdlc

Describe at least two different approaches to a formal SDLC. What type of specific health care system would match well with each? Why is it important for an organization to have a formal SDLC

  Evaluate efficacy of systems and process integration

You have been hired by the senior management team of a publishing house to evaluate the efficacy of systems and process integration with the organization's book distributor.

  Part i 1 the move of retail banking to use atms after

part i 1. the move of retail banking to use atms after citibank unveiled its first atms illustrates the use of

  Create flow chart which gets customer account data

Create the flow chart which gets customer account data which comprises the account number, customer name, and balance due.

  Draw a context diagram and a level 0 logical dfd

Prepare a table of entities and activities.- Draw a context diagram.- Draw a physical data flow diagram (DFD).- Draw a level 0 logical DFD.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd