Information Security Governance: The Art of Detecting Hidden Malware

Mamoun Alazab, Paul Watters, Sitalakshmi Venkatraman, Moutaz Alazab

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Detecting malicious software or malware is one of the major concerns in information security governance as malware authors pose a major challenge to digital forensics by using a variety of highly sophisticated stealth techniques to hide malicious code in computing systems, including smartphones. The current detection techniques are futile, as forensic analysis of infected devices is unable to identify all the hidden malware, thereby resulting in zero day attacks. This chapter takes a key step forward to address this issue and lays foundation for deeper investigations in digital forensics. The goal of this chapter is, firstly, to unearth the recent obfuscation strategies employed to hide malware. Secondly, this chapter proposes innovative techniques that are implemented as a fully-automated tool, and experimentally tested to exhaustively detect hidden malware that leverage on system vulnerabilities. Based on these research investigations, the chapter also arrives at an information security governance plan that would aid in addressing the current and future cybercrime situations.

Original languageEnglish
Title of host publicationIT Security Governance Innovations
Subtitle of host publicationTheory and Research
EditorsDaniel Mellado, Luis Enrique Sánchez, Eduardo Fernández-Medina, Mario G. Piattini
Place of PublicationHershey, PA
PublisherIGI Global
Pages293-315
Number of pages23
ISBN (Electronic)9781466620841
ISBN (Print)9781466620834, 1466620838
DOIs
Publication statusPublished - 2013
Externally publishedYes

Fingerprint

Dive into the research topics of 'Information Security Governance: The Art of Detecting Hidden Malware'. Together they form a unique fingerprint.

Cite this