2021 26th International Conference on Automation and Computing (ICAC) 2021
DOI: 10.23919/icac50006.2021.9594221
|View full text |Cite
|
Sign up to set email alerts
|

The ingenuity of malware substitution: Bypassing next-generation Antivirus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…This capability is distinct from detecting malicious use of Windows API function calls via function hooking, as is described in Section II of this paper. Some example publications we identified in the past four years on bypassing anti-virus/EDR systems using a variety of techniques are from Genc et al [14] with controlling mouse and keyboard inputs in a novel way, Ellahi with C# memory manipulation [15], Ajmal et al [16] with process injection techniques, and Chatzoglou et al [17] with code obfuscation and other techniques. One final note is that these example publications illustrate "bypassing" anti-virus/EDR systems by achieving a no-alert result rather than overt tampering and prevention of alerting that the research in this paper focuses on.…”
Section: Related Workmentioning
confidence: 99%
“…This capability is distinct from detecting malicious use of Windows API function calls via function hooking, as is described in Section II of this paper. Some example publications we identified in the past four years on bypassing anti-virus/EDR systems using a variety of techniques are from Genc et al [14] with controlling mouse and keyboard inputs in a novel way, Ellahi with C# memory manipulation [15], Ajmal et al [16] with process injection techniques, and Chatzoglou et al [17] with code obfuscation and other techniques. One final note is that these example publications illustrate "bypassing" anti-virus/EDR systems by achieving a no-alert result rather than overt tampering and prevention of alerting that the research in this paper focuses on.…”
Section: Related Workmentioning
confidence: 99%