Datenschutz und Datensicherheit - DuD

, Volume 34, Issue 3, pp 149-155

First online:

Static detection of application backdoors

Detecting both malicious software behavior and malicious indicators from the static analysis of executable code
  • Chris Wysopal
  • , Chris Eng
  • , Tyler Shields

Rent the article at a discount

Rent now

* Final gross prices may vary according to local VAT.

Get Access


Backdoors in legitimate software, whether maliciously inserted or carelessly introduced, are a risk that should be detected prior to the affected software or system being deployed. Automated static analysis of executable code can detect many classes of malicious behavior. This paper will cover the techniques that can be employed to detect special credentials, hidden commands, information leakage, rootkit behavior, anti-debugging, and time bombs.