du.sePublikationer
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • chicago-author-date
  • chicago-note-bibliography
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Bypassing computer protection solutions for modern operating systems
Högskolan Dalarna, Akademin Industri och samhälle, Datateknik.
2018 (Engelska)Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
Abstract [en]

Antivirus Software Companies have seen a lot of development over the last decennary, beginning with the signature-based scanners and then slowly implementing more advanced heuristics techniques. Most of these have shown their ability to scan files stored on the hard drive and also opcodes in memory. As of date, most antivirus detection technologies used are; signature-based detection and heuristic-based detection. Malware signatures work by creating checksum hashes of known suspect files, so the smallest change prevents a match. Sometimes hackers and malicious users try finding ways around signatures and bypass signature-based detections by modifying existing malware with a few harmless strings to throw off signature based detection. I propose a project which aims to study how attackers and malicious codes can identify signatures of malware and modify it without changing its functionality with the aim of avoiding signature-based Antivirus software scanners which do not use heuristics at all. I have used netcat binary files in the reverse engineering process and proved how many antivirus scanner scan be bypassed. I also have used the python tool to create codes. From my experiment, I have proved the futility of the antivirus protection against malware. Through this report, I want to reach out and point out the safety measurements users can take to reduce attacks. I also have ensured that the common users are informed about the antivirus types and how they work. A user must be aware that antivirus software is not a full-proof protection as there are plenty of loopholes the researchers have to point out, but it does not mean the security should be compromised. Through this report, I would also like to highlight the fact that it is the responsibility of the user to follow simple guidelines to ensure protection, and the antivirus developers are responsible for keeping their database up-to-date.

Ort, förlag, år, upplaga, sidor
2018.
Nationell ämneskategori
Övrig annan teknik
Identifikatorer
URN: urn:nbn:se:du-27697OAI: oai:DiVA.org:du-27697DiVA, id: diva2:1207043
Tillgänglig från: 2018-05-21 Skapad: 2018-05-18 Senast uppdaterad: 2018-05-21Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Av organisationen
Datateknik
Övrig annan teknik

Sök vidare utanför DiVA

GoogleGoogle Scholar

urn-nbn

Altmetricpoäng

urn-nbn
Totalt: 164 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • chicago-author-date
  • chicago-note-bibliography
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf