Detecting malicious software or malware is one of the major concerns in information security governance as malware authors pose a major challenge to digital forensics by using a variety of highly sophisticated stealth techniques to hide malicious code in computing systems, including smartphones. The current detection techniques are futile, as forensic analysis of infected devices is unable to identify all the hidden malware, thereby resulting in zero day attacks. This chapter takes a key step forward to address this issue and lays foundation for deeper investigations in digital forensics. The goal of this chapter is, firstly, to unearth the recent obfuscation strategies employed to hide malware. Secondly, this chapter proposes innovative techniques that are implemented as a fully-automated tool, and experimentally tested to exhaustively detect hidden malware that leverage on system vulnerabilities. Based on these research investigations, the chapter also arrives at an information security governance plan that would aid in addressing the current and future cybercrime situations.
|Title of host publication||IT Security Governance Innovations|
|Subtitle of host publication||Theory and Research|
|Editors||Daniel Mellado, Luis Enrique Sánchez, Eduardo Fernández-Medina, Mario G. Piattini|
|Place of Publication||Hershey, PA|
|Number of pages||23|
|ISBN (Print)||9781466620834, 1466620838|
|Publication status||Published - 2013|