NUST Institutional Repository

METAMORPHIC TECHNIQUES AND THEIR APPLICATION ON HAVEX MALWARE

Show simple item record

dc.contributor.author Mumtaz, Zainub
dc.date.accessioned 2021-01-11T06:51:27Z
dc.date.available 2021-01-11T06:51:27Z
dc.date.issued 2017
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/20834
dc.description.abstract Most of the commercial antiviruses are signature based, that is, they use existing database signature to detect the malware. Malware authors use code obfuscation techniques to evade detection by antiviruses. Metamorphic malware change their internal structure hence evading signature based detection. Different detection techniques can be found in literature to detect the obfuscated malware also. Havex is an exclusive malware used in cyberespionage campaign launched by a group of attackers, Dragonfly or Energetic Bear, which infects OS Windows. It has targeted multiple sectors so far such as industrial/machinery, manufacturing, pharmaceutical, construction, education and Information Technology. Its main target is ICS and SCADA systems. Havex uses multiple attack vectors to compromise the targets with the coordination of Command and Control infrastructure to download the set of payloads. For effective defense against the malware, their construction needs to be explored. This includes the study of different obfuscation techniques and possibilities of their extension. This thesis focuses on obfuscation technqiues of malware including dead code insertion, instruction substitution and function permutation. The objective is to make detection difficult by implementing subject techniques which bypass detection. Havex malware is used as a proof of concept for our antivirus evasion strategy. We have used Hidden Markov Models (HMM), which is a statistical based machine learning detection method, to test the effectiveness of our code morphing. This has shown the strength of our implemented obfuscation techniques. en_US
dc.description.sponsorship Dr. Mehreen Afzal en_US
dc.language.iso en en_US
dc.publisher MCS, National University of Sciences and Technology en_US
dc.subject HAVEX MALWARE, METAMORPHIC TECHNIQUES en_US
dc.title METAMORPHIC TECHNIQUES AND THEIR APPLICATION ON HAVEX MALWARE en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account