Obfuscation procedure based on the insertion of the dead code in the crypter by binary search

Cristian Barría Huidobro, David Cordero, Claudio Cubillos, Héctor Allende Cid, Claudio Casado Bárragan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

What threatens the cyberspace is known as malware, which in order to infect the technological devices, it has to be capable of bypassing the antivirus motor. To avoid the antivirus detection, the malicious code requires to be updated and have undergone an obfuscation process. However, the problem of the updating is to consider that the malware maintains its functionality based on its specific characteristics, and also to be checked by specilized informatic resources. For the aforementioned, this paper proposes a procedure that allows to apply the AVFUCKER, DSPLIT, and Binary Division techniques with the aim of optimizing the necessary technological resources, and reducing the time of analysis of the malware's functionality and the evasion of the antivirus.

Original languageEnglish
Title of host publication2018 7th International Conference on Computers Communications and Control, ICCCC 2018 - Proceedings
EditorsFlorin Gheorghe Filip, Domnica Dzitac, Ioan Dzitac, Misu-Jan Manolescu, Simona Dzitac, Horea Oros
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages183-192
Number of pages10
ISBN (Electronic)9781538619346
DOIs
StatePublished - 19 Jun 2018
Event7th International Conference on Computers Communications and Control, ICCCC 2018 - Oradea, Romania
Duration: 8 May 201812 May 2018

Publication series

Name2018 7th International Conference on Computers Communications and Control, ICCCC 2018 - Proceedings

Conference

Conference7th International Conference on Computers Communications and Control, ICCCC 2018
Country/TerritoryRomania
CityOradea
Period8/05/1812/05/18

Keywords

  • AvFucker
  • Dsplit
  • Malware
  • antivirus
  • cyberspace
  • evasion
  • obfuscation techniques

Fingerprint

Dive into the research topics of 'Obfuscation procedure based on the insertion of the dead code in the crypter by binary search'. Together they form a unique fingerprint.

Cite this