Obfuscation Engines Research Papers - Academia.edu (original) (raw)
1,142 Followers
Recent papers in Obfuscation Engines
This chapter presents an outline of the challenges involved in constructing efficient malware detection engines using hybrid CPU/GPU-accelerated architectures and discussed how one can overcome such challenges. Starting with a general... more
This chapter presents an outline of the challenges involved in constructing efficient malware detection engines using hybrid CPU/GPU-accelerated architectures and discussed how one can overcome such challenges. Starting with a general problem description for malware detection and moving on to the algorithmic background involved for solving it, we present a review of the existing approaches for detecting malware and discuss how such approaches may be improved through GPU-accelerated
processing. We describe and discuss several hybrid hardware architectures built for detecting malicious software and outline the particular characteristics of each, separately, followed by a debate on their performance and most suitable application in real-world environments. Finally, we tackle the problem of performing real-time malware detection and present the most important aspects which need to be taken into account in intrusion detection systems.
A short paper on the troubles of Stuxnet
Abstract: User application has been developed with very rapid progress. Security vulnerabilities due to amendment of escape characters and comment characters with the actual keywords becomes predominant in the current IT environments.... more
Abstract: User application has been developed with very rapid progress. Security vulnerabilities due to amendment of escape characters and comment characters with the actual keywords becomes predominant in the current IT environments. There are some malicious attacks which can deceive this SQL. To stop string literal escape characters injections, many techniques have been proposed but they require large code modification and/or large extra time overhead.
The work of this paper proposes a technique SQL Injection Protector for Authentication (SQLIPA) with the help of removal of SQL Query attribute Algorithm. In addition to the proposed technique we are trying to store the user credentials in the images and retrieve the same for validation. These images will be stored in BLOB format with Encrypted layer in the backend to hide the tuples used for storage. Validating the XML content with typed dataset will scrutinize the input data further.
Keywords: Chaffing and Winnowing, SQL Injection, Obfuscation, Hash defined algorithm
Title: OBFUSCATED PROTECTION WITH CHAFFING AND WINNOWING AGAINST SQL INJECTION
Author: Ms. A. Sivasankari, Sangeetha.V
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Morphing engines or mutation engines are exploited by metamorphic virus to change the code appearance in every new generation. The purpose of these engines is to escape from the signature-based scanner, which employs a unique string... more
Morphing engines or mutation engines are exploited by metamorphic virus to change the code appearance in every new generation. The purpose of these engines is to escape from the signature-based scanner, which employs a unique string signature to detect the virus. Although the obfuscation techniques try to convert the binary sequence of the code, in some techniques, the statistical feature of the code binaries will be still remain unchanged, relatively. Accordingly, this feature can be utilized to classify the engine and detect the morphed virus code. In this article, we are going to introduce a new idea to classify the obfuscation engines based on their code statistical feature using the histogram comparison.