dc.contributor.advisor | Νταντογιάν, Χριστόφορος | |
dc.contributor.advisor | Dadoyan, Christoforos | |
dc.contributor.author | Τσιούτσιας, Θεόδωρος | |
dc.contributor.author | Tsioutsias, Theodoros | |
dc.date.accessioned | 2020-02-18T07:16:57Z | |
dc.date.available | 2020-02-18T07:16:57Z | |
dc.date.issued | 2019 | |
dc.identifier.uri | https://dione.lib.unipi.gr/xmlui/handle/unipi/12622 | |
dc.identifier.uri | http://dx.doi.org/10.26267/unipi_dione/45 | |
dc.format.extent | 32 | el |
dc.language.iso | en | el |
dc.publisher | Πανεπιστήμιο Πειραιώς | el |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.title | Analysis and evaluation of ROPInjector | el |
dc.type | Master Thesis | el |
dc.contributor.department | Σχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτων | el |
dc.description.abstractEN | This thesis is to analyze the shellcode injecting tool named ROPInjector. The tool explores the potential of Return Oriented
Programming as an antivirus evasion technique. The analysis is going to be twofold. Firstly, we are going to present the
functionality of the tool by diving into the various algorithms used for transforming malicious code into its ROP equivalent.
We are going to present the purpose of each mechanism and discuss about the implementation. At the same time, we will
perform a detailed qualitative inquiry by comparing the input and the resulting (i.e. infected) binaries in order to evaluate the performance and effectiveness of ROPInjector. Last but not least, using the results of this analysis we are going to propose
next steps in order to make the tool friendlier to the user, allowing researchers of the community to use it for their work. | el |
dc.contributor.master | Τεχνοοικονομική Διοίκηση και Ασφάλεια Ψηφιακών Συστημάτων | el |
dc.subject.keyword | ROPInjector | el |
dc.subject.keyword | Portable executable file | el |
dc.date.defense | 2019-01-31 | |