IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Security Governance: The Art of Detecting Hidden Malware

Information Security Governance: The Art of Detecting Hidden Malware
View Sample PDF
Author(s): Mamoun Alazab (Australian National University, Australia), Sitalakshmi Venkatraman (University of Ballarat, Australia), Paul Watters (University of Ballarat, Australia)and Moutaz Alazab (Deakin University, Australia)
Copyright: 2013
Pages: 23
Source title: IT Security Governance Innovations: Theory and Research
Source Author(s)/Editor(s): Daniel Mellado (Spanish Tax Agency, Spain), Luis Enrique Sánchez (University of Castilla-La Mancha, Spain), Eduardo Fernández-Medina (University of Castilla – La Mancha, Spain)and Mario G. Piattini (University of Castilla - La Mancha, Spain)
DOI: 10.4018/978-1-4666-2083-4.ch011

Purchase

View Information Security Governance: The Art of Detecting Hidden Malware on the publisher's website for pricing and purchasing information.

Abstract

Detecting malicious software or malware is one of the major concerns in information security governance as malware authors pose a major challenge to digital forensics by using a variety of highly sophisticated stealth techniques to hide malicious code in computing systems, including smartphones. The current detection techniques are futile, as forensic analysis of infected devices is unable to identify all the hidden malware, thereby resulting in zero day attacks. This chapter takes a key step forward to address this issue and lays foundation for deeper investigations in digital forensics. The goal of this chapter is, firstly, to unearth the recent obfuscation strategies employed to hide malware. Secondly, this chapter proposes innovative techniques that are implemented as a fully-automated tool, and experimentally tested to exhaustively detect hidden malware that leverage on system vulnerabilities. Based on these research investigations, the chapter also arrives at an information security governance plan that would aid in addressing the current and future cybercrime situations.

Related Content

Robert Casal, Raghvendra Singh, Daniel Della Posta, James Quinn. © 2023. 24 pages.
Nikitha Agnew, Manish Gupta, Raj Sharman. © 2023. 43 pages.
Ajeethra Balamurugan, Harshitha Anand Shetty, Karthikeyan Muthumani Sengunthar, Manish Gupta. © 2023. 27 pages.
Harshada Dayasagar Samant, Raghvendra Singh. © 2023. 31 pages.
Raghvendra Singh. © 2023. 21 pages.
Prabhat Kumar, Othniel Lambert, Sivajit Sreekumar, Mukesh Ravi Bhatia, Akash Garg. © 2023. 34 pages.
Sushmita Podugu, Vamsi Krishna Rayapureddi, Manish Gupta. © 2023. 30 pages.
Body Bottom