Unlimited WordPress themes, plugins & video downloads!

Research

Research – Software.Distribution.Malware.Infection.Vector.pdf

This paper presents an efficient mechanism as well as the corresponding reference implementation for on-the-fly infecting of executable code with malicious software. Their algorithm deploys virus infection routines and network redirection attacks, without requiring the modification of the application itself. This allows infection of executables with an embedded signature when the signature is not automatically verified before execution. They briefly discuss countermeasures such as secure channels, code authentication as well as trusted virtualization that enables the isolation of untrusted downloads from other applications running in trusted domains or compartments.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/68332/Software.Distribution.Malware.Infection.Vector.pdf

Source: https://packetstormsecurity.com/files/68332/Software.Distribution.Malware.Infection.Vector.pdf.html

Related posts
Research

Research - EUSecWest 2010 Call For Papers

Research

Research - ewdd.pdf

Research

Research - exploit.txt

Research

Research - Exploiting DLLs: A Guide To DLL Hijacking

Sign up for our Newsletter and
stay informed