Techniques for evading automated analysis
Abhishek Singh looks at some of the techniques that are commonly
used by malware to bypass analysis in a virtualized environment.
Copyright © 2013 Virus Bulletin
The full article is currently available to subscribers.
If you are already a VB subscriber, please login to view the full article.
Virus Bulletin - independent malware advice
- Thought-provoking news and opinions from respected members of the AV industry.
- Detailed analyses of the latest virus threats.
- Feature-length articles exploring new developments in the fight against viruses.
- Interviews with leading anti-virus experts.
- Independent indepth evaluations of current AV products.
- Easy-to-read comparative reviews featuring the unique VB100 award scheme.
VB Spam Supplement - a monthly magazine supplement covering spam and anti-spam techniques.