DocumentCode :
3589942
Title :
The malicious code hiding techniques, code obfuscation problem
Author :
Hurtuk, Jan ; Copjak, Marek ; Dufala, Marek ; Drienik, Pavol
Author_Institution :
Dept. of Electron. of Comput. & Inf., FEI TU of Kosice, Kosice, Slovakia
fYear :
2014
Firstpage :
181
Lastpage :
185
Abstract :
Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds of more sophisticated and faster systems are being created and more complex technologies are being made, which clearly opens various paths for various criminal menaces. To be able to react appropriate and fast on this threads and protect valuable property of its own, to protect the data and be able to find an appropriate solution for protecting them and for preventing them from damage or any other misusing, man should be aware of the processes behind the whole cycle and be able to define the whole menace scope given to the general situation and scenario.
Keywords :
data encapsulation; data protection; invasive software; code obfuscation problem; data protection; information processing; malicious code hiding techniques; malware; Computers; Encryption; Engines; Malware; Semantics; Software; decyptor and encryptor; garbage; metamorphism; obfuscation; permutation; polymorphism; structure;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging eLearning Technologies and Applications (ICETA), 2014 IEEE 12th International Conference on
Print_ISBN :
978-1-4799-7739-0
Type :
conf
DOI :
10.1109/ICETA.2014.7107581
Filename :
7107581
Link To Document :
بازگشت