Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique

Abdollah, M. F. (2010) Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique. In: 2010 the International Conference on Intelligent Network and Computing (ICINC 2010), November 26 - 28, 2010, Kuala Lumpur, Malaysia.

[img]
Preview
PDF
rp041_vol.2-Z224.pdf - Published Version

Download (672kB)

Abstract

Virus Monitoring and Analysis System (VMAS) is generally used for monitoring and capturing virus behavior, and it can produce a report analysis which can be used by expert user to learn virus activity. There are several tools which have this capability, such as: Joebox, ThreatExpert, CWSandbox, and Sysinternals. Turns out, these tools are not fully perfect in analyzing the virus behavior. Therefore in this paper, we propose a technique to defeat such tools, by exploiting the limitation of VMAS in term of time monitoring, by introducing a new virus exploiting technique called Delayed Trigger Technique (DTT).

Item Type: Conference or Workshop Item (Paper)
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Information and Communication Technology > Department of System and Computer Communication
Depositing User: Mohd Faizal Abdollah
Date Deposited: 20 Apr 2013 14:12
Last Modified: 28 May 2015 03:46
URI: http://eprints.utem.edu.my/id/eprint/6975
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item