Abstract
Data security researchers are facing significant challenges in overcoming malware's complexity and making efforts to reduce threat to data. Reverse engineering (RE) has emerged as a significant approach, to analyze a program's logic flow an internal data structures, such as system call functions. The use of packers and binary tools that encourage code generation enable malicious content detection. Packers are software programs that compress and encrypt other executable files in a disk and restore the original executable images , when the packed files are loaded into memories. The latest malware can completely bypass personal firewalls and antivirus (AV) scanners, by using executable packers. Experts suggest that security researchers and AV products need to be able to unpack and inspect the payloads hidden within the packed programs using RE tools.
Original language | English (US) |
---|---|
Article number | 4639028 |
Pages (from-to) | 65-69 |
Number of pages | 5 |
Journal | IEEE Security and Privacy |
Volume | 6 |
Issue number | 5 |
DOIs | |
State | Published - Sep 2008 |
All Science Journal Classification (ASJC) codes
- Computer Networks and Communications
- Electrical and Electronic Engineering
- Law