DocumentCode
630115
Title
Stealthy software: Next-generation cyber-attacks and defenses
Author
Hamlen, K.W.
Author_Institution
Comput. Sci. Dept., Univ. of Texas at Dallas, Dallas, TX, USA
fYear
2013
fDate
4-7 June 2013
Firstpage
109
Lastpage
112
Abstract
Weaponized software is the latest development in a decades-old battle of virus-antivirus co-evolution. Reactively adaptive malware and automated binary transformation are two recently emerging offensive and defensive (respectively) technologies that may shape future cyberwarfare weapons. The former intelligently learns and adapts to antiviral defenses fully automatically in the wild, while the latter applies code mutation technology to defense, transforming potentially dangerous programs into safe programs. These technologies and their roles within the landscape of malware attack and defense are examined and discussed.
Keywords
computer viruses; learning (artificial intelligence); military computing; program interpreters; weapons; antiviral defenses; automated binary transformation; code mutation technology; cyberwarfare weapons; defensive technologies; intelligent learning; malware attack; malware defense; next-generation Cyber-attacks; offensive technologies; potentially dangerous program transformation; reactively adaptive malware; safe programs; stealthy software; virus-antivirus coevolution; weaponized software; Malware; Monitoring; Payloads; Safety; Software; Weapons;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on
Conference_Location
Seattle, WA
Print_ISBN
978-1-4673-6214-6
Type
conf
DOI
10.1109/ISI.2013.6578797
Filename
6578797
Link To Document