Proposed classification of malware, based on obfuscation

Cristian Barría, David Cordero, CLAUDIO ALONSO CUBILLOS FIGUEROA, Miguel Palma

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Malware are the big threat within the digital world as they have a highly complex technological structure that is capable of penetrating networks, obtaining confidential information from personal computers and corporate systems, and even of making systems of critical infrastructure vulnerable. However, in order to achieve their objectives, they need to remain updated, so that they will not be detected by the different protection systems which re primarily antivirus. This investigation proposes a certain malware classification based on their obfuscation capacity, and also considering the methods, techniques, procedures and tools that a malicious code requires and that whose result suggests a general vision of the malware and its effective evasion in cyber space.

Original languageEnglish
Title of host publication2016 6th International Conference on Computers Communications and Control, ICCCC 2016
EditorsIoan Dzitac, Florin Gheorghe Filip, Misu-Jan Manolescu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages37-44
Number of pages8
ISBN (Electronic)9781509017355
DOIs
StatePublished - 20 Jun 2016
Externally publishedYes
Event6th International Conference on Computers Communications and Control, ICCCC 2016 - Baile Felix-Oradea, Romania
Duration: 10 May 201614 May 2016

Publication series

Name2016 6th International Conference on Computers Communications and Control, ICCCC 2016

Conference

Conference6th International Conference on Computers Communications and Control, ICCCC 2016
Country/TerritoryRomania
CityBaile Felix-Oradea
Period10/05/1614/05/16

Keywords

  • antiviru
  • cyber space
  • Malware
  • obfuscation techniques

Fingerprint

Dive into the research topics of 'Proposed classification of malware, based on obfuscation'. Together they form a unique fingerprint.

Cite this