O'Reilly logo

Advanced Malware Analysis by Christopher Elisan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER4

Protective Mechanisms

 

Deploying malware is a risky business. The deployment technology or malware infection vector can be intercepted, opening up the malware it is carrying to exposure. Once a malware is deployed, it always carries with it the risk of being captured. And once the malware is captured, it can then be analyzed, which is not a good thing for the attackers because this leads to the malware’s behavior being understood and the malware technologies being discovered. With all this knowledge, researchers then have the ability to stop the spread of the malware by blocking whatever infection vector it is using and can create a solution for the malware to prevent it from achieving its purpose. To avoid ratting itself out and revealing ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required