In recent years, PowerShell-based attacks have been widely employed to compromise systems’ security. Attackers can easily hide such malicious scripts in file formats (e.g., Office document macros) that can be easily delivered via large-scale spam mail campaigns. Moreover, attackers employ obfuscation techniques that make the PowerShell code able to evade the most common anti-malware protections and perform unauthorized actions that will target the confidentiality, integrity and availability of an information system. In this paper, we present PowerDecode, an open-source module for the de-obfuscation and the analysis of PowerShell scripts. In particular, this module receives a script as an input and returns its obfuscated layers, its...
International audienceDigitization is the era of today, and today's success is measured based on the...
Code injection attacks against server and client applications have become the primary method of malw...
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware dete...
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating s...
Complex operating system administration tasks can be automated and simplified by using scripting lan...
Avoiding antivirus detection in penetration testing activities is tricky. The simplest, most effecti...
This electronic version was submitted by the student author. The certified thesis is available in th...
Every day thousands of malware are released online. The vast majority of these malware employ some k...
Nowadays, users and devices are rapidly growing, and there is a massive migration of data and infras...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...
Abstract—Every day thousands of malware are released on-line. The vast majority of these malware emp...
peer-reviewedMicrosoft Office may be by far the most widely used suite for processing documents, spr...
Obfuscation techniques are a general category of software protections widely adopted to prevent mali...
Cyberattacks are often difficult to identify with traditional signature‐based detection, because att...
Cyberdefense became important, especially duringthe last decade. The rapid growth of information tec...
International audienceDigitization is the era of today, and today's success is measured based on the...
Code injection attacks against server and client applications have become the primary method of malw...
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware dete...
PowerShell is nowadays a widely-used technology to administrate and manage Windows-based operating s...
Complex operating system administration tasks can be automated and simplified by using scripting lan...
Avoiding antivirus detection in penetration testing activities is tricky. The simplest, most effecti...
This electronic version was submitted by the student author. The certified thesis is available in th...
Every day thousands of malware are released online. The vast majority of these malware employ some k...
Nowadays, users and devices are rapidly growing, and there is a massive migration of data and infras...
Malware is a program with malicious intent that has the potential to harm the machine on which it ex...
Abstract—Every day thousands of malware are released on-line. The vast majority of these malware emp...
peer-reviewedMicrosoft Office may be by far the most widely used suite for processing documents, spr...
Obfuscation techniques are a general category of software protections widely adopted to prevent mali...
Cyberattacks are often difficult to identify with traditional signature‐based detection, because att...
Cyberdefense became important, especially duringthe last decade. The rapid growth of information tec...
International audienceDigitization is the era of today, and today's success is measured based on the...
Code injection attacks against server and client applications have become the primary method of malw...
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware dete...