Malware authors and attackers don’t like what we analysts do, and to dissuade us, they are going to create obstacles otherwise known as armoring, to make the process of analyzing and detecting malware difficult. To this end, malware uses various armoring and evasion techniques. Armoring techniques are usually meant to hinder malware analysis, while evasion techniques are meant to evade ...
19. Armoring and Evasion: The Anti-Techniques
Get Malware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.