2014
DOI: 10.1007/s10207-014-0262-9
|View full text |Cite
|
Sign up to set email alerts
|

GPU-assisted malware

Abstract: Malware writers constantly seek new methods to increase the infection lifetime of their malicious software. To that end, techniques such as code unpacking and polymorphism have become the norm for hindering automated or manual malware analysis and evading virus scanners. In this paper, we demonstrate how malware can take advantage of the ubiquitous and powerful graphics processing unit (GPU) to increase its robustness against analysis and detection. We present the design and implementation of brute-force unpac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…Several examples of GPU-assisted malware have been analyzed so far (Vasiliadis et al, Oct 2010;Ladakis et al, 2013;Triulzi, 2008;Danisevskis et al, 2014). For instance, in Ladakis et al (2013) the GPU is used to implement a stealthy keylogger.…”
Section: Related Workmentioning
confidence: 97%
See 3 more Smart Citations
“…Several examples of GPU-assisted malware have been analyzed so far (Vasiliadis et al, Oct 2010;Ladakis et al, 2013;Triulzi, 2008;Danisevskis et al, 2014). For instance, in Ladakis et al (2013) the GPU is used to implement a stealthy keylogger.…”
Section: Related Workmentioning
confidence: 97%
“…To access the keyboard buffer, the GPU uses the physical addressing through DMA, without any CPU intervention. In (Vasiliadis et al, Oct 2010) the authors present a proof-of-concept which leverages GPU to unpack the code of a malware with a XOR-based encryption scheme using several random keys. To hinder the analysis, the malware's code is unpacked at runtime and the decryption keys are stored in the device memory, that is not accessible from the CPU.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Given the increasing number of cyber-attacks, more cyber professionals are needed (Symantec Corp., 2018). However, there exists a shortage of qualified individuals.…”
Section: Introductionmentioning
confidence: 99%