Call for Paper - August 2019 Edition
IJCA solicits original research papers for the August 2019 Edition. Last date of manuscript submission is July 20, 2019. Read More

Split Personality Malware: A Security Threat

Print
PDF
IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)
© 2012 by IJCA Journal
ncipet - Number 14
Year of Publication: 2012
Authors:
Nisha Lalwani
M.B.Chandak
R.V.Dharaskar

Nisha Lalwani, M.B.Chandak and R.V.Dharaskar. Article: Split Personality Malware: A Security Threat. IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012) ncipet(14):23-26, March 2012. Full text available. BibTeX

@article{key:article,
	author = {Nisha Lalwani and M.B.Chandak and R.V.Dharaskar},
	title = {Article: Split Personality Malware: A Security Threat},
	journal = {IJCA Proceedings on National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2012)},
	year = {2012},
	volume = {ncipet},
	number = {14},
	pages = {23-26},
	month = {March},
	note = {Full text available}
}

Abstract

Malware, also known as malicious code and malicious software, refers to a program that is inserted into a system, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or otherwise annoying or disrupting the victim. Security analysts extensively use virtual machines to analyse sample programs and study them to determine if they contain any malware. Malware detection is again a crucial aspect of software security. This paper is intended to help organizations understand the threats posed by malware and mitigate the risks associated with malware incidents. In addition to providing background information on the major categories of malware, this paper majorly focuses on Analysis Aware Malware also called as Split Personality Malware which checks for the presence of Malware Analysis tools and behaves in a benign manner thus escaping detection.

References

  • Erbschloe, Michael. Trojans, Worms, and Spyware: A Computer Security Professional’s Guide to Malicious Code. Butterworth-Heinemann, 2004.
  • M. Eichin and J. Rochlis. With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. In Proceedings of IEEE Security and Privacy, Oakland, CA, June 1989.
  • Vishnani K. (2011), “Introduction to Malware”. http://securityresearch.in/index.php/2011/01/projects/malware_lab/introduction-to-Malware/?ubiquitous_id=17 (Jan 20, 2011)
  • Effcient Detection of Split Personalities in Malware”. In the Proceedings of 17th Annual Network and Distributed System Security Symposium (NDSS 2010),San Diego, February 2010
  • OECD, “Malicious Software (Malware): A security threat to Indian economy”,(2007) http://www.oecd.org/dataoecd/53/34/40724457.pdf (Oct 20, 2010)
  • Vishnani K., Pais A., Mohandas R. (Aug, 2011), “Detecting & Defeating Split Personality Malware”. In the Proceeding of Fifth International Conference on Emerging Security Information, Systems and Technologies. France, August 2011.
  • P. Ferrie. “Attacks on Virtual Machines”. In Proceedings of the Association of Anti-Virus Asia Researcher Conference, 2007.

Keywords