Title :
Stealthy software: Next-generation cyber-attacks and defenses
Author_Institution :
Comput. Sci. Dept., Univ. of Texas at Dallas, Dallas, TX, USA
Abstract :
Weaponized software is the latest development in a decades-old battle of virus-antivirus co-evolution. Reactively adaptive malware and automated binary transformation are two recently emerging offensive and defensive (respectively) technologies that may shape future cyberwarfare weapons. The former intelligently learns and adapts to antiviral defenses fully automatically in the wild, while the latter applies code mutation technology to defense, transforming potentially dangerous programs into safe programs. These technologies and their roles within the landscape of malware attack and defense are examined and discussed.
Keywords :
computer viruses; learning (artificial intelligence); military computing; program interpreters; weapons; antiviral defenses; automated binary transformation; code mutation technology; cyberwarfare weapons; defensive technologies; intelligent learning; malware attack; malware defense; next-generation Cyber-attacks; offensive technologies; potentially dangerous program transformation; reactively adaptive malware; safe programs; stealthy software; virus-antivirus coevolution; weaponized software; Malware; Monitoring; Payloads; Safety; Software; Weapons;
Conference_Titel :
Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on
Conference_Location :
Seattle, WA
Print_ISBN :
978-1-4673-6214-6
DOI :
10.1109/ISI.2013.6578797