Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Malware and Windows APIs: A Dangerous Duo

View through CrossRef
This paper introduces its interaction with malware and Windows APIs (application programming interface). The first section describes malware and investigates various types such as viruses, worms and trojans, as well as provides a brief history of malware and its evolution. The second section provides an overview of the Windows APIs. It shows how these interfaces allow software and operating systems to communicate with each other. It also highlights the most commonly used Windows APIs and their functions۔ The follow-up section explores how malware uses Windows APIs for malicious purposes، Explains the common methods used by malware to communicate with these interfaces۔ Includes real-world examples of malware attacks that use some Windows APIs. The study then turns its attention to the Windows API security mechanism, given the security measures taken by Windows to prevent the use of unauthorized APIs۔ The importance of user account control (UAC) and various monitoring and access control systems has been highlighted. The next section introduces the API Hoking and its application to malware. Which explains the strategies used by malware to hook Windows APIs۔ The effects of API hooking and possible detection methods are also discussed. This article provides an in-depth overview of real-world malware that exploits Windows APIs through case studies and analysis. Notable malware analyzes examples using family and API-based attacks۔ The article discusses security tools and ways to identify and block API-based malware, as well as how to design secure programs with Windows APIs Suggestions for this have also been discussed. Finally, malware tactics targeting Windows APIs discuss potential trends and issues, as well as expected API security challenges in the Windows context. This study continues to look at advances in Windows API security and their implications for malware prevention.
Title: Malware and Windows APIs: A Dangerous Duo
Description:
This paper introduces its interaction with malware and Windows APIs (application programming interface).
The first section describes malware and investigates various types such as viruses, worms and trojans, as well as provides a brief history of malware and its evolution.
The second section provides an overview of the Windows APIs.
It shows how these interfaces allow software and operating systems to communicate with each other.
It also highlights the most commonly used Windows APIs and their functions۔ The follow-up section explores how malware uses Windows APIs for malicious purposes، Explains the common methods used by malware to communicate with these interfaces۔ Includes real-world examples of malware attacks that use some Windows APIs.
The study then turns its attention to the Windows API security mechanism, given the security measures taken by Windows to prevent the use of unauthorized APIs۔ The importance of user account control (UAC) and various monitoring and access control systems has been highlighted.
The next section introduces the API Hoking and its application to malware.
Which explains the strategies used by malware to hook Windows APIs۔ The effects of API hooking and possible detection methods are also discussed.
This article provides an in-depth overview of real-world malware that exploits Windows APIs through case studies and analysis.
Notable malware analyzes examples using family and API-based attacks۔ The article discusses security tools and ways to identify and block API-based malware, as well as how to design secure programs with Windows APIs Suggestions for this have also been discussed.
Finally, malware tactics targeting Windows APIs discuss potential trends and issues, as well as expected API security challenges in the Windows context.
This study continues to look at advances in Windows API security and their implications for malware prevention.

Related Results

Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
The need to mitigate malware attacks cannot be overemphasized, as they pose serious threats to the critical information assets in cyberspace. Understanding and utilizing appropriat...
MCPDS: image-based malware classification method using PE metadata alone
MCPDS: image-based malware classification method using PE metadata alone
Abstract In response to the increasing threat posed by the exponential growth of malware in cybersecurity, researchers have developed a numbe...
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
Android Malware Detection Techniques: A Literature Review
Android Malware Detection Techniques: A Literature Review
Objective: This paper provides the basics of Android malware, its evolution and tools and techniques for malware analysis. Its main aim is to present a review of the literature on ...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
 The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
Malware Image Classification Using Deep Learning InceptionResNet-V2 and VGG-16 Method
Malware Image Classification Using Deep Learning InceptionResNet-V2 and VGG-16 Method
Malware is intentionally designed to damage computers, servers, clients or computer networks. Malware is a general term used to describe any program designed to harm a computer or ...
Windows PE Malware Detection Using Ensemble Learning
Windows PE Malware Detection Using Ensemble Learning
In this Internet age, there are increasingly many threats to the security and safety of users daily. One of such threats is malicious software otherwise known as malware (ransomwar...
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Deteksi Malware Statis Menggunakan Deep Neural Networks Pada Portable Executable
Latar Belakang: Dua komponen utama pada analisismalware adalah analisis malware statis yang melibatkan pemeriksaan struktur dasar malware yang dapat dieksekusi tanpa mengeksekusiny...

Back to Top