Information security governance: the art of detecting hidden malware

Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul and Alazab, Moutaz 2013, Information security governance: the art of detecting hidden malware. In Mellado, Daniel, Sanchez, Luis Enrique, Fernandez-Medina, Eduardo and Piattini, Mario G. (ed), IT security governance innovations: theory and research, IGI Global, Hershey, Pa., pp.293-315.

Attached Files
Name Description MIMEType Size Downloads

Title Information security governance: the art of detecting hidden malware
Author(s) Alazab, Mamoun
Venkatraman, Sitalakshmi
Watters, Paul
Alazab, Moutaz
Title of book IT security governance innovations: theory and research
Editor(s) Mellado, Daniel
Sanchez, Luis Enrique
Fernandez-Medina, Eduardo
Piattini, Mario G.
Publication date 2013
Chapter number 11
Total chapters 11
Start page 293
End page 315
Total pages 23
Publisher IGI Global
Place of Publication Hershey, Pa.
Summary Detecting malicious software or malware is one of the major concerns in information security governance as malware authors pose a major challenge to digital forensics by using a variety of highly sophisticated stealth techniques to hide malicious code in computing systems, including smartphones. The current detection techniques are futile, as forensic analysis of infected devices is unable to identify all the hidden malware, thereby resulting in zero day attacks. This chapter takes a key step forward to address this issue and lays foundation for deeper investigations in digital forensics. The goal of this chapter is, firstly, to unearth the recent obfuscation strategies employed to hide malware. Secondly, this chapter proposes innovative techniques that are implemented as a fully-automated tool, and experimentally tested to exhaustively detect hidden malware that leverage on system vulnerabilities. Based on these research investigations, the chapter also arrives at an information security governance plan that would aid in addressing the current and future cybercrime situations.
ISBN 978146662083
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category B1 Book chapter
Persistent URL

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 176 Abstract Views, 6 File Downloads  -  Detailed Statistics
Created: Wed, 23 Oct 2013, 11:12:53 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact