Vista simple de metadatos

dc.contributor.authorCordero D., Cubillos C., Cid H.A.es_CL
dc.contributor.authorBarría Huidobro, Cristian [Universidad Mayor, Chile]es_CL
dc.contributor.authorCasado Barragán, Claudio [Universidad Mayor, Chile]es_CL
dc.date.accessioned2020-08-12T14:11:55Z
dc.date.accessioned2020-08-12T19:30:39Z
dc.date.available2020-08-12T14:11:55Z
dc.date.available2020-08-12T19:30:39Z
dc.date.issued2018es_CL
dc.identifier.citationC. B. Huidobro, D. Cordero, C. Cubillos, H. A. Cid and C. C. Barragán, "Obfuscation procedure based on the insertion of the dead code in the crypter by binary search," 2018 7th International Conference on Computers Communications and Control (ICCCC), Oradea, 2018, pp. 183-192, doi: 10.1109/ICCCC.2018.8390457.es_CL
dc.identifier.urihttps://ieeexplore.ieee.org/document/8390457es_CL
dc.identifier.urihttps://doi.org/10.1109/ICCCC.2018.8390457es_CL
dc.identifier.urihttp://repositorio.umayor.cl/xmlui/handle/sibum/6964
dc.descriptionPublished in: 2018 7th International Conference on Computers Communications and Control (ICCCC), 8-12 May 2018
dc.description.abstractWhat threatens the cyberspace is known as malware, which in order to infect the technological devices, it has to be capable of bypassing the antivirus motor. To avoid the antivirus detection, the malicious code requires to be updated and have undergone an obfuscation process. However, the problem of the updating is to consider that the malware maintains its functionality based on its specific characteristics, and also to be checked by specilized informatic resources. For the aforementioned, this paper proposes a procedure that allows to apply the AVFUCKER, DSPLIT, and Binary Division techniques with the aim of optimizing the necessary technological resources, and reducing the time of analysis of the malware's functionality and the evasion of the antivirus.es_CL
dc.format.extentPaper presentado a conferencia
dc.language.isoenes_CL
dc.publisherIEEEes_CL
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Chile
dc.titleObfuscation procedure based on the insertion of the dead code in the crypter by binary searches_CL
dc.typeArtículo o paperes_CL
umayor.facultadFacultad de Ciencias
umayor.indizadorCOT
umayor.politicas.sherpa/romeoSuscripciónes_CL
umayor.indexadoSCOPUSes_CL
dc.identifier.doiDOI: 10.1109/ICCCC.2018.8390457es_CL]
umayor.indicadores.scopus-(scimago-sjr)ÍNDICE H: 16es_CL


Vista simple de metadatos



Modificado por: Sistema de Bibliotecas Universidad Mayor - SIBUM
DSpace software copyright © 2002-2018  DuraSpace