First Step Towards Modeling Unbreakable Malware

08/14/2020
by   Tiantian Ji, et al.
0

Currently, the construction of concealed malicious code has become a trend, and attackers try to use this to hide their attack intentions. However, the building of stealthy malware is still unable to counter the reverse analysis of security experts. In response to this problem, this paper models a class of malware with "unbreakable" security attributes–UBM (UnBreakable Malware). We have systematically studied such threats from models, methods, experiments, evaluations, and defenses. Specifically, first, we conducted a formal definition and security attribute research on UBM. We proposed two key characteristics that must be met in order to achieve "unbreakable" security attributes and their corresponding evaluation quaternions. Second, we summarized and implemented four algorithms that can be used to construct UBM, and verified the "unhackable" security attributes based on the evaluation of the two key features. Furthermore, we completed the construction of UBM using the implementation of four verified algorithms and proved the practical applicability of UBM by calculating the volume increment and analyzing the actual counter defense capabilities. Finally, for UBM, a new threat to cyberspace, this article discusses possible defense measures and hopes to promote the establishment of a corresponding defense system.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset