We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Evading Malware Analysis Using Reverse Execution

Abstract: Malware is a security threat, and various means are adapted to detect and block them. In this paper, we demonstrate a method where malware can evade malware analysis. The method is based on single-step reverse execution of code using the self-debugging feature. We discuss how self-debugging code works and use that to derive reverse execution for any payload. Further, we demonstrate the feasibility of a detection evading malware through a real implementation that targets Linux x86-64 architecture for a reference implementation. The reference implementation produces one result when run in one direction and a different result when run in the reverse direction.
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:2111.13894 [cs.CR]
  (or arXiv:2111.13894v1 [cs.CR] for this version)

Submission history

From: Manjesh Kumar Hanawal [view email]
[v1] Sat, 27 Nov 2021 13:30:25 GMT (204kb,D)

Link back to: arXiv, form interface, contact.