Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique

Virus Monitoring and Analysis System (VMAS) is generally used for monitoring and capturing virus behavior, and it can produce a report analysis which can be used by expert user to learn virus activity. There are several tools which have this capability, such as: Joebox, ThreatExpert, CWSandbox,...

Full description

Saved in:
Bibliographic Details
Main Author: Abdollah, M. F.
Format: Conference or Workshop Item
Language:English
Published: 2010
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/6975/1/rp041_vol.2-Z224.pdf
http://eprints.utem.edu.my/id/eprint/6975/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.6975
record_format eprints
spelling my.utem.eprints.69752015-05-28T03:46:22Z http://eprints.utem.edu.my/id/eprint/6975/ Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique Abdollah, M. F. QA75 Electronic computers. Computer science Virus Monitoring and Analysis System (VMAS) is generally used for monitoring and capturing virus behavior, and it can produce a report analysis which can be used by expert user to learn virus activity. There are several tools which have this capability, such as: Joebox, ThreatExpert, CWSandbox, and Sysinternals. Turns out, these tools are not fully perfect in analyzing the virus behavior. Therefore in this paper, we propose a technique to defeat such tools, by exploiting the limitation of VMAS in term of time monitoring, by introducing a new virus exploiting technique called Delayed Trigger Technique (DTT). 2010 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utem.edu.my/id/eprint/6975/1/rp041_vol.2-Z224.pdf Abdollah, M. F. (2010) Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique. In: 2010 the International Conference on Intelligent Network and Computing (ICINC 2010), November 26 - 28, 2010, Kuala Lumpur, Malaysia.
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Abdollah, M. F.
Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique
description Virus Monitoring and Analysis System (VMAS) is generally used for monitoring and capturing virus behavior, and it can produce a report analysis which can be used by expert user to learn virus activity. There are several tools which have this capability, such as: Joebox, ThreatExpert, CWSandbox, and Sysinternals. Turns out, these tools are not fully perfect in analyzing the virus behavior. Therefore in this paper, we propose a technique to defeat such tools, by exploiting the limitation of VMAS in term of time monitoring, by introducing a new virus exploiting technique called Delayed Trigger Technique (DTT).
format Conference or Workshop Item
author Abdollah, M. F.
author_facet Abdollah, M. F.
author_sort Abdollah, M. F.
title Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique
title_short Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique
title_full Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique
title_fullStr Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique
title_full_unstemmed Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique
title_sort penetrating the virus monitoring and analysis system using delayed trigger technique
publishDate 2010
url http://eprints.utem.edu.my/id/eprint/6975/1/rp041_vol.2-Z224.pdf
http://eprints.utem.edu.my/id/eprint/6975/
_version_ 1665905338438647808
score 13.211869