CFP last date
20 January 2025
Reseach Article

Split Personality Malware: A Security Threat

Published on March 2012 by Nisha Lalwani, M.B.Chandak, R.V.Dharaskar
2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
Foundation of Computer Science USA
NCIPET - Number 14
March 2012
Authors: Nisha Lalwani, M.B.Chandak, R.V.Dharaskar
4b5ed07f-bfee-4457-9f3f-f1e69216debe

Nisha Lalwani, M.B.Chandak, R.V.Dharaskar . Split Personality Malware: A Security Threat. 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013). NCIPET, 14 (March 2012), 23-26.

@article{
author = { Nisha Lalwani, M.B.Chandak, R.V.Dharaskar },
title = { Split Personality Malware: A Security Threat },
journal = { 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013) },
issue_date = { March 2012 },
volume = { NCIPET },
number = { 14 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 23-26 },
numpages = 4,
url = { /proceedings/ncipet/number14/5297-1109/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%A Nisha Lalwani
%A M.B.Chandak
%A R.V.Dharaskar
%T Split Personality Malware: A Security Threat
%J 2nd National Conference on Innovative Paradigms in Engineering and Technology (NCIPET 2013)
%@ 0975-8887
%V NCIPET
%N 14
%P 23-26
%D 2012
%I International Journal of Computer Applications
Abstract

Malware, also known as malicious code and malicious software, refers to a program that is inserted into a system, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or otherwise annoying or disrupting the victim. Security analysts extensively use virtual machines to analyse sample programs and study them to determine if they contain any malware. Malware detection is again a crucial aspect of software security. This paper is intended to help organizations understand the threats posed by malware and mitigate the risks associated with malware incidents. In addition to providing background information on the major categories of malware, this paper majorly focuses on Analysis Aware Malware also called as Split Personality Malware which checks for the presence of Malware Analysis tools and behaves in a benign manner thus escaping detection.

References
  1. Erbschloe, Michael. Trojans, Worms, and Spyware: A Computer Security Professional’s Guide to Malicious Code. Butterworth-Heinemann, 2004.
  2. M. Eichin and J. Rochlis. With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. In Proceedings of IEEE Security and Privacy, Oakland, CA, June 1989.
  3. Vishnani K. (2011), “Introduction to Malware”. http://securityresearch.in/index.php/2011/01/projects/malware_lab/introduction-to-Malware/?ubiquitous_id=17 (Jan 20, 2011)
  4. Effcient Detection of Split Personalities in Malware”. In the Proceedings of 17th Annual Network and Distributed System Security Symposium (NDSS 2010),San Diego, February 2010
  5. OECD, “Malicious Software (Malware): A security threat to Indian economy”,(2007) http://www.oecd.org/dataoecd/53/34/40724457.pdf (Oct 20, 2010)
  6. Vishnani K., Pais A., Mohandas R. (Aug, 2011), “Detecting & Defeating Split Personality Malware”. In the Proceeding of Fifth International Conference on Emerging Security Information, Systems and Technologies. France, August 2011.
  7. P. Ferrie. “Attacks on Virtual Machines”. In Proceedings of the Association of Anti-Virus Asia Researcher Conference, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Split Personality