• DocumentCode
    630115
  • Title

    Stealthy software: Next-generation cyber-attacks and defenses

  • Author

    Hamlen, K.W.

  • Author_Institution
    Comput. Sci. Dept., Univ. of Texas at Dallas, Dallas, TX, USA
  • fYear
    2013
  • fDate
    4-7 June 2013
  • Firstpage
    109
  • Lastpage
    112
  • Abstract
    Weaponized software is the latest development in a decades-old battle of virus-antivirus co-evolution. Reactively adaptive malware and automated binary transformation are two recently emerging offensive and defensive (respectively) technologies that may shape future cyberwarfare weapons. The former intelligently learns and adapts to antiviral defenses fully automatically in the wild, while the latter applies code mutation technology to defense, transforming potentially dangerous programs into safe programs. These technologies and their roles within the landscape of malware attack and defense are examined and discussed.
  • Keywords
    computer viruses; learning (artificial intelligence); military computing; program interpreters; weapons; antiviral defenses; automated binary transformation; code mutation technology; cyberwarfare weapons; defensive technologies; intelligent learning; malware attack; malware defense; next-generation Cyber-attacks; offensive technologies; potentially dangerous program transformation; reactively adaptive malware; safe programs; stealthy software; virus-antivirus coevolution; weaponized software; Malware; Monitoring; Payloads; Safety; Software; Weapons;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligence and Security Informatics (ISI), 2013 IEEE International Conference on
  • Conference_Location
    Seattle, WA
  • Print_ISBN
    978-1-4673-6214-6
  • Type

    conf

  • DOI
    10.1109/ISI.2013.6578797
  • Filename
    6578797