PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating systems. However, it is also extensively used by malware vectors to execute payloads or drop additional malicious contents. Similarly to other scripting languages used by malware, PowerShell attacks are challenging to analyze due to the extensive use of multiple obfuscation layers, which make the real malicious code hard to be unveiled. To the best of our knowledge, a comprehensive solution for properly de-obfuscating such attacks is currently missing. In this paper, we present PowerDrive, an open-source, static and dynamic multi-stage de-obfuscator for PowerShell attacks. Power-Drive instruments the PowerShell code to progressively de-obfusca...
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ ...
Cyberdefense became important, especially duringthe last decade. The rapid growth of information tec...
The rapid advances social media, educational tools and communications platforms available today have...
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating s...
In recent years, PowerShell-based attacks have been widely employed to compromise systems’ security...
Complex operating system administration tasks can be automated and simplified by using scripting lan...
Nowadays, users and devices are rapidly growing, and there is a massive migration of data and infras...
This thesis describes the design and implementation of a framework, PowerScan, which provides the ab...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Exploits that successfully attack computers are mostly based on some form of shellcode, i.e., illegi...
Every day thousands of malware are released online. The vast majority of these malware employ some k...
In contrast to most benign applications, malware infects its host system. It does so via system-wide...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
Avoiding antivirus detection in penetration testing activities is tricky. The simplest, most effecti...
With the increasingly rapid development of new malicious computer software by bad faith actors, both...
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ ...
Cyberdefense became important, especially duringthe last decade. The rapid growth of information tec...
The rapid advances social media, educational tools and communications platforms available today have...
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating s...
In recent years, PowerShell-based attacks have been widely employed to compromise systems’ security...
Complex operating system administration tasks can be automated and simplified by using scripting lan...
Nowadays, users and devices are rapidly growing, and there is a massive migration of data and infras...
This thesis describes the design and implementation of a framework, PowerScan, which provides the ab...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Exploits that successfully attack computers are mostly based on some form of shellcode, i.e., illegi...
Every day thousands of malware are released online. The vast majority of these malware employ some k...
In contrast to most benign applications, malware infects its host system. It does so via system-wide...
Malicious code detection is a crucial component of any defense mechanism. In this paper, we present ...
Avoiding antivirus detection in penetration testing activities is tricky. The simplest, most effecti...
With the increasingly rapid development of new malicious computer software by bad faith actors, both...
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ ...
Cyberdefense became important, especially duringthe last decade. The rapid growth of information tec...
The rapid advances social media, educational tools and communications platforms available today have...