dc.contributor.advisor | Νταντογιάν, Χριστόφορος | |
dc.contributor.author | Καλογράνης, Χρήστος | |
dc.contributor.author | Kalogranis, Christos | |
dc.date.accessioned | 2018-06-05T06:54:06Z | |
dc.date.available | 2018-06-05T06:54:06Z | |
dc.date.issued | 2018-02 | |
dc.identifier.uri | https://dione.lib.unipi.gr/xmlui/handle/unipi/11232 | |
dc.format.extent | 30 | el |
dc.language.iso | en | el |
dc.publisher | Πανεπιστήμιο Πειραιώς | el |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές | * |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.title | AntiVirus software evasion: an evaluation of the AV Evasion tools | el |
dc.type | Master Thesis | el |
dc.contributor.department | Σχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτων | el |
dc.description.abstractEN | This thesis focuses in the efficiency of the free given to the internet AV Evasion tools which have been developed for penetration testing. A selection of these tools has been made for the purpose of testing on how they can generate undetectable malwares against the most popular AV software products of the market.
The selected AV Evasion tools for evaluation are used for patching malicious Windows Portable Executable files.
A brief review is made for the most popular malware detection and evasion techniques and the selection criteria for the AV Evasion tools and for the AV Software products are presented. Additionally, it is described the lab test and the evaluation results are presented. | el |
dc.contributor.master | Ασφάλεια Ψηφιακών Συστημάτων | el |
dc.subject.keyword | Portable executable file | el |
dc.subject.keyword | AV evasion | el |
dc.subject.keyword | Encoding | el |
dc.subject.keyword | Decoding | el |
dc.subject.keyword | Code cave | el |
dc.subject.keyword | Encryptor | el |
dc.subject.keyword | Decryptor | el |
dc.date.defense | 2018-02-26 | |