Complex operating system administration tasks can be automated and simplified by using scripting languages. For the Windows operating system, one of the most commonly used scripting languages is PowerShell. The PowerShell scripting language provides vast functionality for the system administrators. At the same time, it leaves a large attack surface for adversaries to bypass the OS protections. Signature and supervised machine learning based intrusion detection systems (IDS) can be used for monitoring and detecting such malicious scripts. However, the detection can be evaded by obfuscating the scripts. As the next step in the defense, we can use obfuscation itself as a reliable sign of malicious code. This thesis investigates the methods of ...
Every day thousands of malware are released online. The vast majority of these malware employ some k...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...
Nowadays, computer virus attacks are getting very advanced. New obfuscated computer virus created by...
JavaScript is a common attack vector to probe for known vulnerabilities to select a fitting exploit ...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
Nowadays, computer virus attacks are getting very advanced. New obfuscated computer virus created by...
Nowadays, computer virus attacks are getting very advanced. New obfuscated computer virus created by...
Avoiding antivirus detection in penetration testing activities is tricky. The simplest, most effecti...
This electronic version was submitted by the student author. The certified thesis is available in th...
The revolution in online criminal activities and malicious software (malware) has posed a serious ch...
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating s...
JavaScript is a common attack vector for attacking browsers, browser plug-ins, email clients and oth...
AbstractCode obfuscation was introduced as a viable technique to prevent reverse engineering of soft...
In recent years, PowerShell-based attacks have been widely employed to compromise systems’ security...
Every day thousands of malware are released online. The vast majority of these malware employ some k...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...
Nowadays, computer virus attacks are getting very advanced. New obfuscated computer virus created by...
JavaScript is a common attack vector to probe for known vulnerabilities to select a fitting exploit ...
Malware is a serious threat in a world where IoT devices are becoming more and more pervasive; indee...
Nowadays, computer virus attacks are getting very advanced. New obfuscated computer virus created by...
Nowadays, computer virus attacks are getting very advanced. New obfuscated computer virus created by...
Avoiding antivirus detection in penetration testing activities is tricky. The simplest, most effecti...
This electronic version was submitted by the student author. The certified thesis is available in th...
The revolution in online criminal activities and malicious software (malware) has posed a serious ch...
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating s...
JavaScript is a common attack vector for attacking browsers, browser plug-ins, email clients and oth...
AbstractCode obfuscation was introduced as a viable technique to prevent reverse engineering of soft...
In recent years, PowerShell-based attacks have been widely employed to compromise systems’ security...
Every day thousands of malware are released online. The vast majority of these malware employ some k...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...