Back to Results
First PageMeta Content
Archive formats / Antivirus software / Computer file formats / Zip / Tar / File format / Clam AntiVirus / Computer virus / Portable Executable / System software / Computing / Software


Abusing File Processing in Malware Detectors for Fun and Profit Suman Jana and Vitaly Shmatikov The University of Texas at Austin Abstract—We systematically describe two classes of evasion exploits against automated ma
Add to Reading List

Document Date: 2012-03-06 01:37:39


Open Document

File Size: 247,04 KB

Share Result on Facebook

City

N ETWORK / /

Company

Adobe / BitDefender / SIS POSIX TAR POSIX TAR JPEG SA . / Symantec / Yahoo / Microsoft / /

Currency

CVE / /

Facility

Vitaly Shmatikov The University of Texas / /

IndustryTerm

cross-site / intrusion detection systems / free Web service / Web browsers / malware detection systems / legitimate applications / Web applica / file processing / cloud-based malware detection services / file-type inference algorithm / actual operating systems / intrusion prevention systems / et al. implement simple protocols / actual applications / format-specific algorithm / actual processing / /

OperatingSystem

Windows Vista / Unix / Linux / Ubuntu / Microsoft Windows / GNU / POSIX / /

Organization

MS Cabinet / University of Texas at Austin / /

Person

LAM AV / Suman Jana / /

Position

extractor / /

Product

UnZip 6.00 / ClamAV / ClamAV v0.95.2 / Zip 3.0 / VirusTotal / Linux / /

ProgrammingLanguage

Visual Basic / HTML / /

ProvinceOrState

Texas / Prince Edward Island / Manitoba / /

RadioStation

Wine 1.2 / /

Technology

file-type inference algorithm / BMP / AV / MPEG / JPEG / Unix / Linux / parsing algorithms / 9 10 6 7 8 11 8 9 9 Algorithm / MP3 / operating system / HTML / format-specific algorithm / operating systems / little-endian / PDF / LZX algorithm / encryption / AhoCorasick algorithm / GIF / parsing algorithm / ASCII / HTTP / Flash / CAT / using the LZX algorithm / /

URL

http /

SocialTag