izpis_h1_title_alt

Zloraba kombinacije obratnega inženirstva, prikrivanja, ukan in varnostnih ranljivosti
ID Hrovat, Jan (Author), ID Peer, Peter (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (2,90 MB)
MD5: E12283A94105DB91730FF0B04BAE4D79

Abstract
Katere so hude grožnje na internetu danes? Lahko se strinjamo, da je zlonamerna programska oprema ena izmed njih. Zlonamerna programska oprema se vsakodnevno izboljšuje. Opazovali smo začetke obdobja zlonamerne programske opreme. Na začetku je bila osnovna, danes pa je napredovala do polimorfne in metamorfne implementacije. Zlonamerna programska oprema lahko uniči podjetja, tovarne; vpliva lahko tudi na ljudi. V diplomski nalogi smo predstavili pregled, kako zmogljiva je lahko zlonamerna programska oprema in kako jo je težko odkriti, kako se jo napiše ter zakrije. Na koncu smo podali praktičen primer: kako samodejno prepoznati ukane Visual Studia. Predstavili smo tudi načine, kako se izogniti okužbi z zlonamerno programsko opremo.

Language:Slovenian
Keywords:zlonamerna koda, škodljiva koda, virus, ranljivost, varnost, prikrivanje, polimorfizem, metamorfizem, izvršljiva koda
Work type:Bachelor thesis/paper
Organization:FRI - Faculty of Computer and Information Science
Year:2018
PID:20.500.12556/RUL-103197 This link opens in a new window
Publication date in RUL:14.09.2018
Views:762
Downloads:301
Metadata:XML RDF-CHPDL DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Abuse of combination of reverse engineering, obfuscation, exploits and security vulnerability
Abstract:
What is the major treat on the internet today? We can all agree that malicious software is one among the long list. Malware is getting better and better every day. We witnessed and we observed the very beginning of the malware era. In the beginning, we knew basic malware, and nowadays, we go up to the polymorphic and metamorphic implementations of those. Malware can sometimes destroy businesses, factories and it can also affect people. This thesis provides an overview of how powerful and stealthy malware can be, how it can be made, obfuscated and revealed. Finally, we look into the practical approach of how to automatically identify a Visual Studio exploit(s). The thesis also introduces ways to avoid getting infected with malicious content.

Keywords:malicious code, harmful code, virus, exploit, safety, obfuscation, polymoprhic, metamorphic, shellcode

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back