Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

a) Suppose your professor wanted to distribute some code to all members of your

ID: 3743736 • Letter: A

Question

a) Suppose your professor wanted to distribute some code to all members of your class. Assume your professor is unquestionably trustworthy. Your professor invents a scheme by which she will denote that her code is safe to use. Before distributing the code, she will send a not to everyone saying she is about to post program P1, so when you find P1 on your class's server you can trust it. How could Mel, a malicious student, sneak in his own malicious code under that model?

b) Continuing the previous question, suppose your professor added that the first 4 bytes of P were abcd. How could Mel sneak in his code under that model?

Explanation / Answer

Answer)

For both the above mentioned cases the hacker / malware writers would find a way or other to insert their malicuous code to the existing machine and also try to hide oneselves as much they can from among the anti virus tools. The technique is simple obfuscation which contains the insertion of NOP which is a no operation instruction, swapping reister as well as reordering independent instruction. This can be done via polymorphic technique and metamorphic technique. Malwares injectors like Mel would take either one of the above technique or both into consideration for any modification/addition for hiding from detection.

Hope this answer helps. :)

Hit like if you find the answer useful. Thanks