Javascript must be enabled to continue!
Malware and Windows APIs: A Dangerous Duo
View through CrossRef
This paper introduces its interaction with malware and Windows APIs (application programming interface). The first section describes malware and investigates various types such as viruses, worms and trojans, as well as provides a brief history of malware and its evolution. The second section provides an overview of the Windows APIs. It shows how these interfaces allow software and operating systems to communicate with each other. It also highlights the most commonly used Windows APIs and their functions۔ The follow-up section explores how malware uses Windows APIs for malicious purposes، Explains the common methods used by malware to communicate with these interfaces۔ Includes real-world examples of malware attacks that use some Windows APIs. The study then turns its attention to the Windows API security mechanism, given the security measures taken by Windows to prevent the use of unauthorized APIs۔ The importance of user account control (UAC) and various monitoring and access control systems has been highlighted. The next section introduces the API Hoking and its application to malware. Which explains the strategies used by malware to hook Windows APIs۔ The effects of API hooking and possible detection methods are also discussed. This article provides an in-depth overview of real-world malware that exploits Windows APIs through case studies and analysis. Notable malware analyzes examples using family and API-based attacks۔ The article discusses security tools and ways to identify and block API-based malware, as well as how to design secure programs with Windows APIs Suggestions for this have also been discussed. Finally, malware tactics targeting Windows APIs discuss potential trends and issues, as well as expected API security challenges in the Windows context. This study continues to look at advances in Windows API security and their implications for malware prevention.
Lahore Garrison University
Title: Malware and Windows APIs: A Dangerous Duo
Description:
This paper introduces its interaction with malware and Windows APIs (application programming interface).
The first section describes malware and investigates various types such as viruses, worms and trojans, as well as provides a brief history of malware and its evolution.
The second section provides an overview of the Windows APIs.
It shows how these interfaces allow software and operating systems to communicate with each other.
It also highlights the most commonly used Windows APIs and their functions۔ The follow-up section explores how malware uses Windows APIs for malicious purposes، Explains the common methods used by malware to communicate with these interfaces۔ Includes real-world examples of malware attacks that use some Windows APIs.
The study then turns its attention to the Windows API security mechanism, given the security measures taken by Windows to prevent the use of unauthorized APIs۔ The importance of user account control (UAC) and various monitoring and access control systems has been highlighted.
The next section introduces the API Hoking and its application to malware.
Which explains the strategies used by malware to hook Windows APIs۔ The effects of API hooking and possible detection methods are also discussed.
This article provides an in-depth overview of real-world malware that exploits Windows APIs through case studies and analysis.
Notable malware analyzes examples using family and API-based attacks۔ The article discusses security tools and ways to identify and block API-based malware, as well as how to design secure programs with Windows APIs Suggestions for this have also been discussed.
Finally, malware tactics targeting Windows APIs discuss potential trends and issues, as well as expected API security challenges in the Windows context.
This study continues to look at advances in Windows API security and their implications for malware prevention.
Related Results
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
Android Malware Detection Techniques: A Literature Review
Android Malware Detection Techniques: A Literature Review
Objective:
This paper provides the basics of Android malware, its evolution and tools and
techniques for malware analysis. Its main aim is to present a review of the literature on ...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
Windows PE Malware Detection Using Ensemble Learning
Windows PE Malware Detection Using Ensemble Learning
In this Internet age, there are increasingly many threats to the security and safety of users daily. One of such threats is malicious software otherwise known as malware (ransomwar...
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Latar Belakang: Dua komponen utama pada analisismalware adalah analisis malware statis yang melibatkan pemeriksaan struktur dasar malware yang dapat dieksekusi tanpa mengeksekusiny...
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
The current high rate of malware variant production each day produces hundreds of thousands of new variants making signature detection methods ineffective. Deep learning patterns s...
Malware and their diverse characteristics related to detection and analysis: A literature survey
Malware and their diverse characteristics related to detection and analysis: A literature survey
The term malware refers to a specific form of software that causes damage to the computing device through data leakage and transformation, device malfunctioning, hacking, and explo...
Malware Detection using Deep Learning
Malware Detection using Deep Learning
Malicious software or malware continues to pose a major security concern in this digital age as computer users, corporations, and governments witness an exponential growth in malwa...

