EconPapers    
Economics at your fingertips  
 

Detecting Malicious Code by Binary File Checking

Marius Popa ()

Informatica Economica, 2014, vol. 18, issue 1, 111-119

Abstract: The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

Keywords: Malicious Code; Binary File; Malware Detection (search for similar items in EconPapers)
Date: 2014
References: View references in EconPapers View complete reference list from CitEc
Citations:

Downloads: (external link)
http://www.revistaie.ase.ro/content/69/10%20-%20Popa.pdf (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aes:infoec:v:18:y:2014:i:1:p:111-119

Access Statistics for this article

Informatica Economica is currently edited by Ion Ivan

More articles in Informatica Economica from Academy of Economic Studies - Bucharest, Romania Contact information at EDIRC.
Bibliographic data for series maintained by Paul Pocatilu ().

 
Page updated 2025-03-19
Handle: RePEc:aes:infoec:v:18:y:2014:i:1:p:111-119