Datenschutz und Datensicherheit - DuD

, Volume 34, Issue 3, pp 149–155

Static detection of application backdoors

Detecting both malicious software behavior and malicious indicators from the static analysis of executable code
  • Chris Wysopal
  • Chris Eng
  • Tyler Shields

DOI: 10.1007/s11623-010-0024-4

Cite this article as:
Wysopal, C., Eng, C. & Shields, T. DuD (2010) 34: 149. doi:10.1007/s11623-010-0024-4


Backdoors in legitimate software, whether maliciously inserted or carelessly introduced, are a risk that should be detected prior to the affected software or system being deployed. Automated static analysis of executable code can detect many classes of malicious behavior. This paper will cover the techniques that can be employed to detect special credentials, hidden commands, information leakage, rootkit behavior, anti-debugging, and time bombs.

Copyright information

© Vieweg+Teubner | GWV Fachverlage GmbH 2010

Authors and Affiliations

  • Chris Wysopal
  • Chris Eng
  • Tyler Shields

There are no affiliations available

Personalised recommendations