The Convergence of Binary Exploits and Modern Malware: Techniques, Threats, and Defenses

Muhammad Fahad Athar

Abstract: Binary exploits and modern malware represent critical threats in today’s cybersecurity landscape. This article explores the intricate relationship between these two domains, focusing on how binary exploitation techniques like buffer overflows, return-oriented programming (ROP), and heap exploitation serve as entry points for sophisticated malware attacks. The evolution of malware, from ransomware to fileless malware, highlights how exploit techniques have been weaponized to bypass defences, escalate privileges, and persist undetected. The article also covers defensive strategies, including patch management, the use of security mechanisms like DEP and ASLR, and advanced monitoring techniques. Understanding this convergence is essential for building resilient systems and mitigating the risks posed by these evolving threats.

Keywords: Malware, stack overflow, threats, cybersecurity.

Title: The Convergence of Binary Exploits and Modern Malware: Techniques, Threats, and Defenses

Author: Muhammad Fahad Athar

International Journal of Computer Science and Information Technology Research

ISSN 2348-1196 (print), ISSN 2348-120X (online)

Vol. 12, Issue 3, July 2024 - September 2024

Page No: 13-16

Research Publish Journals

Website: www.researchpublish.com

Published Date: 18-September-2024

DOI: https://doi.org/10.5281/zenodo.13777211

Vol. 12, Issue 3, July 2024 - September 2024

Citation
Share : Facebook Twitter Linked In

Citation
The Convergence of Binary Exploits and Modern Malware: Techniques, Threats, and Defenses by Muhammad Fahad Athar