• Corpus ID: 221756099

EVALUATING THE EFFECTIVENESS OF ANTIVIRUS EVASION TOOLS AGAINST WINDOWS PLATFORM

@inproceedings{Aminu2020EVALUATINGTE,
  title={EVALUATING THE EFFECTIVENESS OF ANTIVIRUS EVASION TOOLS AGAINST WINDOWS PLATFORM},
  author={Shawwal Adam Aminu and Zahraddeen Sufyanu and Taju Sani and Abdullahi Idris},
  year={2020}
}
Despite the prevalence of cyber-crimes, information and communication technology ICT has become the most convenient medium of communication and information exchanges. With this development, the information security breach is now one of the complex and challenging issues software developers are facing. The tools that have been developed for penetration testing with the purpose to raise the level of security strength, have been used also by malicious intruders to gain access to our devices. This… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 20 REFERENCES
AntiVirus software evasion: an evaluation of the AV Evasion tools
TLDR
This thesis focuses in the efficiency of the free given to the internet AV Evasion tools which have been developed for penetration testing on how they can generate undetectable malwares against the most popular AV software products of the market.
Malware Detection and Evasion with Machine Learning Techniques : A Survey
TLDR
A survey of existing researches regarding to malware detection and evasion is made by examining possible scenarios where malware could take advantage of machine learning and cryptography to improve its evasion techniques and infection impact.
Security Assessment via Penetration Testing: A Network and System Administrator's Approach
TLDR
The aim of this thesis is to identify and explain a suitable methodology behind the penetration testing and illustrate free and open source tools and techniques to simulate a possible attacks that the Network and System Administrators can use against their network or system.
Penetration Testing
  • C. Weissman
  • Computer Science
    Encyclopedia of Social Network Analysis and Mining
  • 2014
TLDR
The Flaw Hypothesis Methodology (FHM) is described, the earliest comprehensive and widely used method for conducting penetrations testing, and its analogy to a heuristic-based strategy game is provided.
A survey of computer-based information systems security implemented by large private manufacturing companies in Kenya.
The need for computer-based information systems in manufacturing is now increasingly inevitable given that, the number of transactions is high, the customers are many and geographically widespread,
A Tool for Antivirus Evasion: pyRAT. The University of Piraeus, Available: https://github.com/govolution/avet
  • www.technopedia.comAccessed:
  • 2019
Commercial Antivirus Software Effectiveness: An Empirical Study
Despite the widespread use of antivirus software, malware remains pervasive. A new study compares the effectiveness of six commercial AV products.
A Tool for Antivirus Evasion: pyRAT. The University of Piraeus
    Encapsulating Antivirus (AV) Evasion Techniques in Metasploit Framework
    • Rapid
    • 2019
    Best Free Antivirus 2019: 6 tried and tested ways to stay safe. Retrieved from: https://www.trustedreviews.com/best/best-freeantivirus3633595
    • Accessed on 28,
    • 2019
    ...
    ...