Deakin University
Browse

File(s) under permanent embargo

Information security governance: the art of detecting hidden malware

chapter
posted on 2013-01-01, 00:00 authored by M Alazab, S Venkatraman, P Watters, Moutaz Alazab
Detecting malicious software or malware is one of the major concerns in information security governance as malware authors pose a major challenge to digital forensics by using a variety of highly sophisticated stealth techniques to hide malicious code in computing systems, including smartphones. The current detection techniques are futile, as forensic analysis of infected devices is unable to identify all the hidden malware, thereby resulting in zero day attacks. This chapter takes a key step forward to address this issue and lays foundation for deeper investigations in digital forensics. The goal of this chapter is, firstly, to unearth the recent obfuscation strategies employed to hide malware. Secondly, this chapter proposes innovative techniques that are implemented as a fully-automated tool, and experimentally tested to exhaustively detect hidden malware that leverage on system vulnerabilities. Based on these research investigations, the chapter also arrives at an information security governance plan that would aid in addressing the current and future cybercrime situations.

History

Title of book

IT security governance innovations: theory and research

Chapter number

11

Pagination

293 - 315

Publisher

IGI Global

Place of publication

Hershey, Pa.

ISBN-13

9781466620841

ISBN-10

1466620838

Language

eng

Publication classification

B1 Book chapter

Copyright notice

2013, IGI Global

Extent

11

Editor/Contributor(s)

D Mellado, L Sanchez, E Fernandez-Medina, M Piattini

Usage metrics

    Research Publications

    Categories

    No categories selected

    Keywords

    Exports