Antivirus evasion techniques in modern malware

Barchuk, Bogdan and Volkov, Kyrylo (2025) Antivirus evasion techniques in modern malware. World Journal of Advanced Research and Reviews, 26 (2). pp. 3154-3166. ISSN 2581-9615

[thumbnail of WJARR-2025-1966.pdf] Article PDF
WJARR-2025-1966.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download ( 634kB)

Abstract

Cybercriminals use new antivirus evasion techniques in their malware to continue operating in a system despite security programs. It explores how the newest malware uses obfuscation, packing, anti-debugging, and tampering with system security to bypass modern protection solutions at endpoints. The research points out that, attackers find ways to take advantage of weaknesses in antivirus heuristics, signature databases, and models that analyze behaviors. Hackers give additional focus to modifying programs, editing data in the hex format, dodging debuggers, and using file-loading tools. The research group also studied how measures like Windows’ SmartScreen and SafeSEH prevent bad software from being started. Detection by today’s antivirus solutions has improved, but it turns out that most evasion techniques can still work because they are flexible and mutable. As a result, organizations must always work on new methods of preventing attacks and stay informed about any threats that may arise.

Item Type: Article
Official URL: https://doi.org/10.30574/wjarr.2025.26.2.1966
Uncontrolled Keywords: Malware Evasion; Code Obfuscation; Anti-Debugging; File Binding; Antivirus Detection; Runtime Packers
Depositing User: Editor WJARR
Date Deposited: 20 Aug 2025 11:35
Related URLs:
URI: https://eprint.scholarsrepository.com/id/eprint/3367