TY - GEN
T1 - Applied Comparative Evaluation of the Metasploit Evasion Module
AU - Casey, Peter
AU - Topor, Mateusz
AU - Hennessy, Emily
AU - Alrabaee, Saed
AU - Aloqaily, Moayad
AU - Boukerche, Azzedine
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/6
Y1 - 2019/6
N2 - The great revitalization of information and communication technologies has facilitated broad connectivity to the Internet. However, this convenience in terms of connectivity comes with costly caveats, including internet fraud, information damage or theft, and cybersecurity issues. Most individuals rely on anti-virus software for protection. This anti-virus software has long been a foe to malware authors, but there are brief moments when new techniques slip through the cracks, and even the most sophisticated engines sometimes fail. A new tool, namely Metasploits new evasion modules, claims to exploit that. In this study, we compare and evaluate legacy evasion techniques with the novel tactics presented by Metasploits lead researcher Wei Chen. We consider the benefits and pitfalls of each technique and evaluate the new modules successes (or failures!).
AB - The great revitalization of information and communication technologies has facilitated broad connectivity to the Internet. However, this convenience in terms of connectivity comes with costly caveats, including internet fraud, information damage or theft, and cybersecurity issues. Most individuals rely on anti-virus software for protection. This anti-virus software has long been a foe to malware authors, but there are brief moments when new techniques slip through the cracks, and even the most sophisticated engines sometimes fail. A new tool, namely Metasploits new evasion modules, claims to exploit that. In this study, we compare and evaluate legacy evasion techniques with the novel tactics presented by Metasploits lead researcher Wei Chen. We consider the benefits and pitfalls of each technique and evaluate the new modules successes (or failures!).
KW - Anti-viruses
KW - Computer viruses
KW - communication secuty
KW - computer security
KW - security methods
UR - http://www.scopus.com/inward/record.url?scp=85078927902&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85078927902&partnerID=8YFLogxK
U2 - 10.1109/ISCC47284.2019.8969663
DO - 10.1109/ISCC47284.2019.8969663
M3 - Conference contribution
AN - SCOPUS:85078927902
T3 - Proceedings - IEEE Symposium on Computers and Communications
BT - Proceedings - IEEE Symposium on Computers and Communications
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 IEEE Symposium on Computers and Communications, ISCC 2019
Y2 - 29 June 2019 through 3 July 2019
ER -