publication . Other literature type . Conference object . Article . 2020

A Game of "Cut and Mouse": Bypassing Antivirus by Simulating User Inputs

Genç, Z.; Lenzini, G.; Sgandurra, D.;
Open Access English
  • Published: 20 Jul 2020
  • Publisher: Zenodo
  • Country: Luxembourg
Abstract
To protect their digital assets from malware attacks, most users and companies rely on anti-virus (AV) software. But AVs’ protection is a full-time task and AVs are engaged in a cat-and-mouse game where malware, e.g., through obfuscation and polymorphism, denial of service attacks and malformed packets and parameters, try to circumvent AV defences or make them crash. On the other hand, AVs react by complementing signature-based with anomaly or behavioral detection, and by using OS protection, standard code, and binary protection techniques. Further, malware counter-act, for instance by using adversarial inputs to avoid detection, et cetera. This paper investigat...
Subjects
free text keywords: Antivirus, Ransomware, Evasion, Vulnerability, Simulated Inputs, : Computer science [C05] [Engineering, computing & technology], : Sciences informatiques [C05] [Ingénierie, informatique & technologie]
Related Organizations
Funded by
EC| FutureTPM
Project
FutureTPM
Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module
  • Funder: European Commission (EC)
  • Project Code: 779391
  • Funding stream: H2020 | RIA
Validated by funder
Download fromView all 5 versions
Zenodo
Other literature type . 2020
Provider: Datacite
ZENODO
Conference object . 2020
Provider: ZENODO
Zenodo
Other literature type . 2020
Provider: Datacite
Any information missing or wrong?Report an Issue