Detecting Malicious Code by Binary File Checking
Marius Popa ()
Informatica Economica, 2014, vol. 18, issue 1, 111-119
Abstract:
The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.
Keywords: Malicious Code; Binary File; Malware Detection (search for similar items in EconPapers)
Date: 2014
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
http://www.revistaie.ase.ro/content/69/10%20-%20Popa.pdf (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aes:infoec:v:18:y:2014:i:1:p:111-119
Access Statistics for this article
Informatica Economica is currently edited by Ion Ivan
More articles in Informatica Economica from Academy of Economic Studies - Bucharest, Romania Contact information at EDIRC.
Bibliographic data for series maintained by Paul Pocatilu ().