Abstract: Binary exploits and modern malware represent critical threats in today’s cybersecurity landscape. This article explores the intricate relationship between these two domains, focusing on how binary exploitation techniques like buffer overflows, return-oriented programming (ROP), and heap exploitation serve as entry points for sophisticated malware attacks. The evolution of malware, from ransomware to fileless malware, highlights how exploit techniques have been weaponized to bypass defences, escalate privileges, and persist undetected. The article also covers defensive strategies, including patch management, the use of security mechanisms like DEP and ASLR, and advanced monitoring techniques. Understanding this convergence is essential for building resilient systems and mitigating the risks posed by these evolving threats.
Keywords: Malware, stack overflow, threats, cybersecurity.
Title: The Convergence of Binary Exploits and Modern Malware: Techniques, Threats, and Defenses
Author: Muhammad Fahad Athar
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Vol. 12, Issue 3, July 2024 - September 2024
Page No: 13-16
Research Publish Journals
Website: www.researchpublish.com
Published Date: 18-September-2024