Applied Comparative Evaluation of the Metasploit Evasion Module

Peter Casey, Mateusz Topor, Emily Hennessy, Saed Alrabaee, Moayad Aloqaily, Azzedine Boukerche

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

The great revitalization of information and communication technologies has facilitated broad connectivity to the Internet. However, this convenience in terms of connectivity comes with costly caveats, including internet fraud, information damage or theft, and cybersecurity issues. Most individuals rely on anti-virus software for protection. This anti-virus software has long been a foe to malware authors, but there are brief moments when new techniques slip through the cracks, and even the most sophisticated engines sometimes fail. A new tool, namely Metasploits new evasion modules, claims to exploit that. In this study, we compare and evaluate legacy evasion techniques with the novel tactics presented by Metasploits lead researcher Wei Chen. We consider the benefits and pitfalls of each technique and evaluate the new modules successes (or failures!).

Original languageEnglish
Title of host publicationProceedings - IEEE Symposium on Computers and Communications
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728129990
DOIs
Publication statusPublished - Jun 2019
Event2019 IEEE Symposium on Computers and Communications, ISCC 2019 - Barcelona, Spain
Duration: Jun 29 2019Jul 3 2019

Publication series

NameProceedings - IEEE Symposium on Computers and Communications
Volume2019-June
ISSN (Print)1530-1346

Conference

Conference2019 IEEE Symposium on Computers and Communications, ISCC 2019
Country/TerritorySpain
CityBarcelona
Period6/29/197/3/19

Keywords

  • Anti-viruses
  • Computer viruses
  • communication secuty
  • computer security
  • security methods

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Mathematics(all)
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Applied Comparative Evaluation of the Metasploit Evasion Module'. Together they form a unique fingerprint.

Cite this