Dec. 9, 2022, 2:10 a.m. | Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia

cs.CR updates on arXiv.org arxiv.org

We look at the use of cryptography to obfuscate malware. Most surveys on
malware obfuscation only discuss simple encryption techniques (e.g., XOR
encryption), which are easy to defeat (in principle), since the decryption
algorithm and the key is shipped within the program. This SoK proposes a
principled definition of malware obfuscation, and categorises instances of
malware obfuscation that use cryptographic tools into those which evade
detection and those which are detectable. The SoK first examines easily
detectable schemes such as …

cryptography malware obfuscation

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Team Lead, Security Operations Center, Cyber Risk

@ Kroll | United Kingdom

Cyber Security Risk Analyst

@ College Board | Remote - Virginia

Lead - IT Security Engineer

@ Bosch Group | BENGALURU, India

Project Cybersecurity Manager

@ Alstom | Bengaluru, KA, IN

Security Consultant

@ CloudSEK | Bengaluru, Karnataka, India