Article

Datenschutz und Datensicherheit - DuD

, Volume 34, Issue 3, pp 149-155

Static detection of application backdoors

Detecting both malicious software behavior and malicious indicators from the static analysis of executable code
  • Chris Wysopal
  • , Chris Eng
  • , Tyler Shields

Rent the article at a discount

Rent now

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Backdoors in legitimate software, whether maliciously inserted or carelessly introduced, are a risk that should be detected prior to the affected software or system being deployed. Automated static analysis of executable code can detect many classes of malicious behavior. This paper will cover the techniques that can be employed to detect special credentials, hidden commands, information leakage, rootkit behavior, anti-debugging, and time bombs.