Skip to Main Content
Intelligent Mobile Malware Detection
book

Intelligent Mobile Malware Detection

by Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
December 2022
Intermediate to advanced content levelIntermediate to advanced
190 pages
4h 56m
English
CRC Press
Content preview from Intelligent Mobile Malware Detection

4Dynamic and Hybrid Malware Detection

DOI: 10.1201/9781003121510-4

All the static analysis mechanisms can be evaded by dynamic code loading attacks [171]. A dynamic code loading attack consists of three steps. In the first step, a malware developer creates an application with two byte codes: a malicious code and a legitimate code. In the next step, he encrypts the malicious byte code. In the final step, he writes a decryption program in the main byte code (legitimate byte code) to decrypt the malicious byte code and compile the application. Hence, the malicious byte code is not available in plain text for analysis. During the runtime, the malicious code gets decrypted and executed in the system. Hence, it is required to consider runtime information ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level

Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level

Jesus Vigo, Jr.
Android Malware and Analysis

Android Malware and Analysis

Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781000824988