<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>S. Simonovi);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Building C2 servers for the assessment of AI based antiviruses</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maksim Iavich</string-name>
          <email>miavich@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergei Simonov</string-name>
          <email>s_simonovi@cu.edu.ge</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>sergio.gnatyuk@gmail.com</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Caucasus University</institution>
          ,
          <addr-line>1 Paata Saakadze St, Tbilisi, 0102</addr-line>
          ,
          <country country="GE">Georgia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>32 Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>In today's rapidly evolving digital landscape, the cat-and-mouse game between cybersecurity professionals and malicious actors continues unabated. As antivirus solutions become more sophisticated, so do the techniques employed by those seeking to bypass them. With the proliferation of digital threats in today's interconnected world, traditional antivirus solutions are facing unprecedented challenges in effectively detecting and mitigating emerging malware. In response to this evolving landscape, the integration of artificial intelligence (AI) techniques has emerged as a promising approach to enhance the capabilities of antivirus systems. This paper delves into the realm of creating custom Command and Control (C2) server in pair with custom written “beacon” and discusses their potential implications for cybersecurity. The primary objective of this research is to analyze the effectiveness of existing AI based antivirus programs in detecting and mitigating custom, zero-day attacks which involve C2 server usage and offer the methodology of custom C2 Server and C2 Beacon creation.</p>
      </abstract>
      <kwd-group>
        <kwd>C2 Servers</kwd>
        <kwd>AV bypass</kwd>
        <kwd>zero-day attacks</kwd>
        <kwd>penetration testing 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The rapid evolution of cyber threats poses significant challenges to the security of digital
systems and networks. Malicious actors continually devise sophisticated techniques to evade
detection by traditional antivirus solutions, thereby compromising the integrity and
confidentiality of sensitive data. In response to these challenges, the integration of artificial
intelligence (AI) technologies has emerged as a promising approach to bolster the effectiveness
of antivirus systems. AI-based antivirus solutions leverage advanced algorithms and machine
learning techniques to detect and mitigate malware in real-time, offering improved accuracy
and efficiency compared to conventional signature-based approaches. In the realm of
cybersecurity, the battle between defenders and adversaries is an ever-evolving story of
innovation and adaptation. As defenders fortify systems with advanced AI based antivirus
solutions, those with malicious intent devise different methods to bypass the barriers built by
defenders. There are a lot of ways to bypass the antivirus software (Ex: process-hollowing) in
order to run the well-known malware (Ex: meterpreter payload, mimikatz), but there are
alternative ways to bypass the antivirus software by utilizing much more simple techniques and
spending much less time in advance. This paper delves into the antivirus software bypass
technique using custom Command and Control (C2) server written in PHP and stealthy beacons
written in C#. The beacon cannot be detected by famous antivirus software updated to the last
version (tested on “windows defender” and “Bitdefender”), which leads to stealthy system
compromise. As the cybersecurity ecosystem advances, defenders are confronted not only with
sophisticated malware but also with adversaries employing unconventional tactics. While
established methods like process-hollowing may achieve their purpose, there is a growing need
for subtler approaches. This paper addresses this imperative by navigating through the
intricacies of a custom C2 infrastructure - unveiling a nuanced technique capable of breaching
well-fortified systems.</p>
      <p>The crux of this research is centered on developing a zero-day methodology—a dynamic
approach to bypassing well-known antivirus software. Zero-day, in this context, signifies an
innovative and undisclosed method, allowing the circumvention of traditional defenses. By
elucidating the intricacies of the devised C2 server and stealthy beacons, this study aims to
contribute not only to the field of cybersecurity research but also to the ongoing narrative of
proactive defense strategies. The research posits a critical question: how can an intrusion be
both effective and undetectable? The answer lies in the stealthy compromise facilitated by the
synergy of the C2 server and discreet beacons. This approach not only challenges the efficacy
of contemporary antivirus solutions but also underscores the need for defenders to remain
vigilant in the face of evolving threats. Beyond the exploration of evasion techniques, this
research sets forth clear objectives. It seeks to comprehensively analyze the antivirus evasion
strategy proposed, evaluate its effectiveness against state-of-the-art solutions, and ultimately
contribute to the ongoing discourse surrounding cybersecurity innovation.</p>
      <p>The goal of the research is developing the zero-day methodology, which can help bypassing
and the assessment of well-known AI based antivirus software. Therefore the goal is to create
the malicious software, which will bypass the well know antiviruses and provide the user with
the remote command execution capabilities.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Review of the literature</title>
      <p>
        Existing literature on cybersecurity has extensively explored various aspects related to
malware, C2 servers, advanced persistent threats (APTs), and related techniques. In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the
authors delve into the communication between Remote Access Trojans (RATs) and Command
and Control (C2) servers, employing symbolic execution for malware analysis. This approach
sheds light on the intricacies of these communications, aiding in the identification and
understanding of potential threats. A comprehensive understanding of advanced persistent
threats is presented in [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], where the authors meticulously analyze the methodologies and tools
employed by APTs. This analysis is crucial for cybersecurity practitioners to develop robust
defense mechanisms against these sophisticated threats. Virtualization plays a pivotal role in
cybersecurity research, as discussed in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], where laboratories are built using virtualization
technologies. The focus on malware beaconing mechanisms and their detection techniques adds
depth to the literature, contributing to the ongoing efforts in enhancing cybersecurity
frameworks. Detection of C2 servers is a critical aspect of cybersecurity, as emphasized in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
where the author not only discusses the various methods employed for detection but also
provides insights into the advantages and limitations of the proposed approaches. This holistic
view is essential for devising effective countermeasures. To gain a comprehensive perspective
on antivirus bypass techniques, papers [[
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]; [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]; [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]; [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]; [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]; [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]; [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]] can be synthesized.
AIbased antivirus systems represent a significant advancement in cybersecurity, offering
enhanced detection capabilities and adaptability to evolving threats [[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]; [14]; [15]]. This
knowledge is crucial for enhancing the efficacy of cybersecurity tools and techniques.
      </p>
      <p>Combining the insights from these papers will enable a deeper understanding of the evolving
landscape of antivirus evasion strategies. Furthermore, an analysis of malware obfuscation
techniques, as explored in [[17]; [18]; [19]], can provide valuable insights into the challenges
faced in detecting and mitigating obfuscated malware.</p>
    </sec>
    <sec id="sec-3">
      <title>3. AI based antiviruses</title>
      <p>AI-based antivirus systems have revolutionized the cybersecurity landscape by increasing the
power of machine learning algorithms to combat an ever-evolving array of cyber threats. At
the core of these systems lies a sophisticated process that amalgamates data collection, feature
extraction, model training, real-time detection, behavioral analysis, adaptation, and response
mechanisms. Data collection serves as the foundation for AI-based antivirus systems. They
gather extensive datasets from diverse sources, including repositories of known malware
samples, network traffic logs, user activities, and system behaviors. This data provides the raw
material necessary for training robust machine learning models.</p>
      <p>Following data collection, the next crucial step is feature extraction. AI algorithms sift
through the collected data to identify pertinent features that distinguish between benign and
malicious software. These features encompass a wide range of attributes, including file
characteristics, behavioral patterns, code structures, and network communication protocols.</p>
      <p>With the extracted features in hand, machine learning models undergo rigorous training.
Various algorithms, such as neural networks, decision trees, or support vector machines, are
employed to train the models using labeled datasets. Through this iterative process, the models
learn to recognize patterns and anomalies associated with malware, thereby sharpening their
ability to discern threats from legitimate software.</p>
      <p>Feature selection and optimization techniques are then applied to refine the trained models
further. Feature selection helps prioritize the most discriminative attributes, while optimization
algorithms fine-tune model parameters to enhance performance and accuracy. Once trained,
AI-based antivirus systems are deployed to monitor network traffic, file systems, and system
activities in real-time. As data streams in, the models analyze it on the fly, comparing observed
patterns against their learned knowledge base to identify potential threats. This real-time
detection capability enables swift responses to emerging threats, minimizing the risk of damage
or data loss.</p>
      <p>In addition to static analysis, AI-based antivirus systems often employ behavioral analysis
techniques. By monitoring software behaviors and system interactions, these systems can detect
suspicious activities indicative of malware, such as unauthorized access attempts, data
exfiltration, or attempts to exploit vulnerabilities. One of the most compelling features of
AIbased antivirus systems is their adaptability. They continuously learn from new data and
feedback, incorporating insights gleaned from previously unseen threats to improve their
detection capabilities. Regular updates ensure that the systems remain effective against the
latest malware variants and attack techniques. In the event of a detected threat, AI-based
antivirus systems trigger an appropriate response mechanism. This could involve quarantining
the suspicious file, blocking network connections associated with malicious activities, alerting
administrators, or initiating automated remediation measures.</p>
      <p>AI-based antivirus systems represent a proactive and dynamic approach to cybersecurity.
By leveraging machine learning, these systems can effectively detect, analyze, and mitigate
cyber threats in real-time, thereby bolstering the security posture of organizations and
safeguarding against a wide array of cyber risks.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Methodology</title>
      <sec id="sec-4-1">
        <title>The offered C2 infrastructure consists of the following components:</title>
        <p>•
•</p>
        <p>C2 Server – the server written in PHP, which gives the orders to the victim computers
which have the beacon installed.</p>
        <p>Beacon – the software written in C#, which contacts the C2 server, receives the
commands, executes them and sends the result back to the C2 server. (All the
communication is being encrypted/encoded).</p>
        <p>The Figure 1, given below, depicts the possible C2 infrastructure deployment. reader may
find the graphical model of the infrastructure:
4.1. C2 Server
The C2 server plays the main role in giving proper orders and exploitation of victim machines.
The C2 server offered in this paper is written using the PHP, but it must be emphasized, that it
could be built using any programming language which is capable of building the web
applications (Ex: python, JS, ruby). The web application built by me consists of the following
components:
•
•</p>
      </sec>
      <sec id="sec-4-2">
        <title>Authentication – To prevent the unauthorized access to the C2 server. Beacon management – The component, which gives the user the ability to send commands to already existing beacons and generate new beacons.</title>
        <p>4.2. The Beacon
The beacon is the software responsible for receiving the orders from C2 Server, executing them
and sending back the response. The beacon offered in this paper is written using C#, but it must
be emphasized, that it could be built using any compiled programming language which is
capable of running shell commands, sending http traffic and using encoding/encryption
algorithms. Below is given the pseudocode of the beacon.</p>
        <p>The pseudo code of the beacon:</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Achieving the stealthiness</title>
      <p>In order to detect the malware, the passive and active detection techniques of antivirus software
must be used. When performing the static analysis of the potentially malicious file, the antivirus
tries to find signatures of well-known malware or specific keywords like “reverse_shell, exec,
hack, pwn” etc. This type of detection can be simply bypassed using custom packers. The
second, active type of detection involves running the software in sandbox, checking for
malicious behavior (Ex: file deletion, registry hives modification, reverse shell attempts) and
analyzing the network traffic. This kind of detection can be bypassed by utilizing well known
antivirus bypass techniques, like process hollowing, but, because these techniques are
frequently used, most antivirus software know how to detect them. The second way to bypass
the antivirus software is making the malware not explicitly malicious. If the program does not
behave maliciously, it’s not considered malicious by antivirus software. This can be used in
favor of a hacker. The beacon software offered by us is not explicitly malicious for the following
reasons: It has no malicious signature that can be detected during the static analysis; when
running the beacon, it does no action that can be treated as malicious. The software sends the
http requests to the server once in 30 seconds. As the http traffic is not considered malicious
and all the communications between the beacon and C2 server are encrypted/encoded, no alarm
is being raised by the antivirus software. Also, the beacon runs in background without showing
any windows.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Communication and encryption</title>
      <p>As it was already mentioned, the beacon and the C2 server use HTTP to communicate, send
orders and the results of the executed commands. The orders are requested by the beacon and
sent by C2 server every 30 seconds. Both the beacon and the C2 server have the same secret
key which is used in process of encoding the commands. The encryption scheme is custom and
simple. We don’t need the standard, security encryption scheme. The scheme is only needed to
hide the plaintext from the antivirus. The process consists of the following steps:
1.
2.
3.</p>
      <sec id="sec-6-1">
        <title>The key is being converted to hex.</title>
        <p>The command is being converted to hex.</p>
        <p>The cypher is the result of concatenation of hex_key and hex_command.</p>
        <p>The same algorithm is used to encrypt and decrypt messages both by beacon and by C2
Server.</p>
        <p>The result of the executed command is sent to the server in the form of base64 string.</p>
        <p>On the Figure 2 below you may find the process of communication between the beacon and
C2 Server.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Experiments</title>
      <p>In the virtual laboratory built with Oracle VirtualBox, we have set up a practical experiment
involving two main virtual machines: Kali Linux as the Command and Control (C2) Server and
Microsoft Windows 10 as the victim machine. Both machines coexist in an isolated virtual
network, creating a controlled environment for our experiments. In order to achieve the
isolation, Oracle Virtual Box internal network adapters were used on the virtual machines.</p>
      <p>The core of our operations revolves around deploying a PHP-based C2 Server on Kali Linux,
facilitated by the "php development server." This setup enables effective communication and
control, forming the foundation of our experiment. The beacon file, a crucial element, is
compiled on Kali Linux and sent to the victim machine using the Python web server (executed
via python3 -m http.server).</p>
      <p>After successful delivery and execution, the beacon establishes a connection, allowing the
victim machine to link with the Kali Linux C2 server. This connection grants us remote
management capabilities, providing access to navigate and manipulate the victim machine.</p>
      <p>Notably, the experimentation has revealed the evasive nature of the deployed malware to
several antivirus engines. The following antivirus engines, equipped with static and dynamic
Machine Learning capabilities, failed to detect the orchestrated malware:</p>
      <p>Acronis (Static ML), AhnLab-V3, AlibabaALYacAntiy-AVL, Arcabit, Avast, AVG, Avira (no
cloud), Baidu, BitDefender, Bkav Pro, ClamAV, CMC, Cynet, DrWeb, Emsisoft, eScan,
ESETNOD32, F-Secure, Fortinet, GData, Google, Gridinsoft (no cloud), Ikarus, Jiangmin,
K7AntiVirus, K7GW, Kaspersky, Kingsoft, Lionic, Malwarebytes, MAX, McAfee, Microsoft,
NANO-Antivirus, Palo Alto, NetworksPanda, QuickHeal, RisingSky, SUPER, AntiSpyware,
Symantec, TACHYON, TEHTRIS, Tencent, Trapmine, TrendMicro, TrendMicro-HouseCall,
Varist, VBA32, VIPRE, Webroot, Xcitium, Yandex.</p>
      <p>The produced malware was also tested using VirusTotal. According to VirusTotal, only 11
antivirus engines from 72 were able to identify the threat. The Figure 3 depicts the results of
the check performed by VirusTotal.</p>
    </sec>
    <sec id="sec-8">
      <title>8. Results discussions</title>
      <p>The research presented in this whitepaper explores the development and effectiveness of a
custom Command and Control (C2) server paired with stealthy beacons, with a focus on
bypassing traditional and AI based antivirus solutions. The primary goal is to analyze the
efficacy of existing antivirus programs in detecting and mitigating custom, zero-day attacks
employing C2 server usage.</p>
      <p>The research successfully demonstrates the capability of the custom C2 infrastructure to
bypass detection by well-known antivirus software, including "Windows Defender" and
"Bitdefender." The beacon, written in C#, is designed to execute commands received from the
C2 server while remaining undetected by antivirus programs. The stealthiness of the beacon
lies in its non-malicious behavior during static analysis and its ability to operate in the
background without displaying any windows.</p>
      <p>The C2 infrastructure consists of a C2 server, written in PHP, responsible for issuing
commands to victim computers with installed beacons, and the beacon itself, a C# software that
communicates with the C2 server. The C2 server includes authentication to prevent
unauthorized access and a beacon management component for issuing commands to existing
beacons and generating new ones.</p>
      <p>The paper emphasizes the importance of making the malware not explicitly malicious to
avoid detection. By ensuring that the beacon performs no actions considered malicious, such as
file deletion or registry modification, and by utilizing encryption and encoding for
communication between the beacon and the C2 server, the researchers achieve a level of
stealthiness that evades detection by antivirus software.</p>
      <p>The communication between the beacon and the C2 server occurs over HTTP, with
commands and results exchanged every 30 seconds. Both the beacon and the C2 server share a
secret key used for encoding and decoding messages. The encryption process involves
converting the key and command to hexadecimal format and concatenating them to create the
cipher. The result of executed commands is sent to the server in the form of a base64 string.</p>
      <p>The findings of this research have significant implications for cybersecurity. The
demonstrated ability to create a custom C2 infrastructure that evades detection highlights the
need for continuous innovation in antivirus solutions. Cybersecurity professionals must adapt
their strategies to counter increasingly sophisticated techniques employed by malicious actors,
emphasizing the importance of proactive measures, threat intelligence, and regular updates to
security protocols.</p>
      <p>While the research contributes to understanding the limitations of current antivirus
solutions, it is essential to emphasize the ethical considerations of such work. The development
and use of tools for penetration testing and security research should align with ethical
standards, ensuring responsible and legal practices. The information presented should not be
misused for malicious purposes, but rather serve as insights for strengthening cybersecurity
defenses.</p>
      <p>In conclusion, the research provides valuable insights into the development of a custom C2
infrastructure and its potential to bypass classical and AI basedantivirus detection. As the
cybersecurity landscape evolves, continual efforts are required to enhance defense mechanisms
and stay ahead of emerging threats. Responsible and ethical use of such knowledge is crucial to
maintaining the integrity of cybersecurity practices.
•
•
•
•</p>
      <sec id="sec-8-1">
        <title>Stealthy compromise Extremely easy to build and Efficiency problems: Slow due to being stealthy Not efficient in case of strictly configured outbound rules of the firewall.</title>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>9. Conclusions and future plans</title>
      <p>The research presented in this whitepaper delves into the creation of a custom Command and
Control (C2) server paired with stealthy beacons, highlighting the evolving landscape of
cybersecurity and the perpetual cat-and-mouse game between defenders and adversaries. The
primary focus is on bypassing traditional and AI based antivirus solutions and analyzing the
effectiveness of existing programs in detecting and mitigating custom, zero-day attacks
involving C2 server usage. The research successfully demonstrates the effectiveness of the
custom C2 infrastructure in evading detection by well-known antivirus software, such as
"Windows Defender" and "Bitdefender." The stealthy beacon, written in C#, executes commands
while remaining undetected due to its non-malicious behavior and operational characteristics.
The C2 infrastructure, comprising a PHP-written C2 server and a C# beacon, showcases the
significance of authentication and beacon management for issuing commands to victim
machines. This establishes a foundation for further exploration into custom C2 architectures.
Emphasizing the need to make malware explicitly non-malicious, the paper outlines strategies
for avoiding detection during static analysis and by active detection methods. The beacon's
ability to operate silently in the background, coupled with encryption and encoding, contributes
to its stealthiness. The communication between the beacon and the C2 server occurs over HTTP,
utilizing a shared secret key for encoding and decoding messages. The encryption process
involves converting the key and command to hexadecimal format, ensuring secure and covert
communication. Implications for Cybersecurity: The research underscores the need for
continuous innovation in antivirus solutions, and the improvement of AI technologies in them
as demonstrated by the creation of a custom C2 infrastructure. Cybersecurity professionals are
urged to adapt strategies to counter evolving techniques employed by malicious actors,
emphasizing proactive measures, threat intelligence, and regular security protocol updates.</p>
      <p>The success of this research opens avenues for future exploration and improvement in
cybersecurity practices. Key areas for future plans include: Investigation of dynamic evasion
techniques that adapt the behavior of the C2 infrastructure in real-time, responding to changes
in antivirus detection methods. Exploring the integration of machine learning algorithms into
antivirus solutions to enhance detection capabilities against novel, custom-written malware and
C2 infrastructures. Researching advanced encryption and steganography techniques to
obfuscate communication and enhance the covert nature of the C2 infrastructure. Exploring the
development of cross-platform C2 infrastructures and beacons, assessing the effectiveness of
antivirus solutions across different operating systems. Conducting the research on the legal and
ethical implications of developing and deploying custom C2 infrastructures, ensuring alignment
with responsible disclosure and ethical hacking practices. Investigating collaborative defense
strategies involving information sharing among cybersecurity professionals, organizations, and
antivirus vendors to collectively strengthen defenses.</p>
      <p>Continued research and innovation in these areas will contribute to the ongoing evolution
of cybersecurity practices, ensuring the resilience of defense mechanisms against emerging
threats in the digital landscape. Responsible and ethical use of knowledge remains paramount
for the integrity of the cybersecurity community.
10. Acknowledgements
This work was supported by the Shota Rustaveli National Foundation of Georgia (SRNSFG)
(NFR-22-14060).
[14] Djenna, Amir, et al. "Artificial intelligence-based malware detection, analysis, and
mitigation." Symmetry 15.3 (2023): 677.
[15] Murali, Ritwik, Palanisamy Thangavel, and C. Shunmuga Velayutham. "Evolving malware
variants as antigens for antivirus systems." Expert Systems with Applications 226 (2023):
120092.
[16] Singh, J., &amp; Singh, J. (2018). Challenge of malware analysis: malware obfuscation
techniques. International Journal of Information Security Science, 7(3), 100-110.
[17] You, I., &amp; Yim, K. (2010, November). Malware obfuscation techniques: A brief survey. In
2010 International conference on broadband, wireless computing, communication and
applications (pp. 297-300). IEEE.
[18] Rad, B. B., Masrom, M., &amp; Ibrahim, S. (2012). Camouflage in malware: from encryption to
metamorphism. International Journal of Computer Science and Network Security, 12(8),
7483.
[19] Maiorca, D., Ariu, D., Corona, I., Aresu, M., &amp; Giacinto, G. (2015). Stealth attacks: An
extended insight into the obfuscation effects on android malware. Computers &amp; Security,
51, 16-31.
[20] Park, D., Khan, H., &amp; Yener, B. (2019, December). Generation &amp; evaluation of adversarial
examples for malware obfuscation. In 2019 18th IEEE International Conference On Machine
Learning And Applications (ICMLA) (pp. 1283-1290). IEEE.
[21] Christodorescu, M., &amp; Jha, S. (2004). Testing malware detectors. ACM SIGSOFT Software</p>
      <p>Engineering Notes, 29(4), 34-44.
[22] Sharif, M. I., Lanzi, A., Giffin, J. T., &amp; Lee, W. (2008, February). Impeding Malware Analysis
Using Conditional Code Obfuscation. In NDSS.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Borzacchiello</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Coppa</surname>
          </string-name>
          , E.,
          <string-name>
            <surname>D'Elia</surname>
            ,
            <given-names>D. C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Demetrescu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Reconstructing C2 servers for remote access trojans with symbolic execution</article-title>
          .
          <source>In Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML</source>
          <year>2019</year>
          ,
          <article-title>Beer-</article-title>
          <string-name>
            <surname>Sheva</surname>
          </string-name>
          , Israel, June 27-28,
          <year>2019</year>
          , Proceedings 3 (pp.
          <fpage>121</fpage>
          -
          <lpage>140</lpage>
          ). Springer International Publishing.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Desmet</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Huygens</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>A study on advanced persistent threats</article-title>
          .
          <source>In Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS</source>
          <year>2014</year>
          , Aveiro, Portugal,
          <source>September 25-26</source>
          ,
          <year>2014</year>
          . Proceedings 15 (pp.
          <fpage>63</fpage>
          -
          <lpage>72</lpage>
          ). Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Syamsuddin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>VILARITY-Virtual laboratory for information security practices</article-title>
          .
          <source>TEM Journal</source>
          ,
          <volume>8</volume>
          (
          <issue>3</issue>
          ),
          <fpage>1011</fpage>
          -
          <lpage>1016</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Gomes</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Efficient Detection Of Malware Beaconing (Doctoral dissertation</article-title>
          , Dublin, National College of Ireland).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>De</given-names>
            <surname>Fusco</surname>
          </string-name>
          ,
          <string-name>
            <surname>L.</surname>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Advanced C2 Fingerprinting (Doctoral dissertation</article-title>
          , Politecnico di Torino).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Nasi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Bypass antivirus dynamic analysis. Limitations of the AV model and how to exploit them.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Yehoshua</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kosayev</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software</article-title>
          .
          <source>Packt Publishing Ltd.</source>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Donadio</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guerard</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Amor</surname>
            ,
            <given-names>S. B.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Collection of the Main Anti-Virus Detection and Bypass Techniques</article-title>
          .
          <source>In Network and System Security: 15th International Conference, NSS</source>
          <year>2021</year>
          , Tianjin, China, October
          <volume>23</volume>
          ,
          <year>2021</year>
          , Proceedings
          <volume>15</volume>
          (pp.
          <fpage>222</fpage>
          -
          <lpage>237</lpage>
          ). Springer International Publishing.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Aryan</given-names>
            <surname>Jadon</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. G. K. BYPASSING ANTIVIRUS AND ANTIVIRUS VULNERABILITIES.</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Daryabar</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dehghantanha</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Udzir</surname>
            ,
            <given-names>N. I.</given-names>
          </string-name>
          (
          <year>2011</year>
          , December).
          <article-title>Investigation of bypassing malware defences and malware detections</article-title>
          .
          <source>In 2011 7th International Conference on Information Assurance and Security (IAS)</source>
          (pp.
          <fpage>173</fpage>
          -
          <lpage>178</lpage>
          ). IEEE.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Tasiopoulos</surname>
            ,
            <given-names>V. G.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Katsikas</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          (
          <year>2014</year>
          ,
          <article-title>October)</article-title>
          .
          <article-title>Bypassing antivirus detection with encryption</article-title>
          .
          <source>In Proceedings of the 18th Panhellenic Conference on Informatics</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Samociuk</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <source>Antivirus Evasion Methods in Modern Operating Systems. Applied Sciences</source>
          ,
          <volume>13</volume>
          (
          <issue>8</issue>
          ),
          <fpage>5083</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Partiot</surname>
          </string-name>
          ,
          <string-name>
            <surname>Emma</surname>
          </string-name>
          , et al.
          <article-title>"Organotypic culture of human brain explants as a preclinical model for AI-driven antiviral studies." EMBO Molecular Medicine (</article-title>
          <year>2024</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>