Abstract:
In the past years, malware developers continuously have been searching for yet new ways to attack hosts and evade existing popular cyber-defense systems, e.g. anti-viruses (AV) and intrusion detection systems (IDS). To intrude, an attacker must solve at least two challenges: develop a malware that is not detected by AVs and deliver the malware to a victim host. Attackers advanced in both challenges.