Back close

Backdoor Analysis of Enterprise Applications

Backdoor Analysis of Enterprise Applications

Malware forms the basis of most cyber-criminal operations causing significant financial loss and posing a huge threat to the security of an organization. Enterprise applications form the backbone of any organization. They have scaled and matured over the years providing more and more services to users. However, the threats that have plagued it has also abounded.The goal of this research is to exhaustively study the problem of backdoors as is seen in software today, to identify the various possible attack vectors, and to develop a scalable and modular framework to detect backdoors in Common Off the Shelf (COTS) software and enterprise applications alike. The framework applies known program analysis techniques such as static and dynamic analysis and uses standard data flow and control flow constructs to study the flow of information in a program to conclude for backdoors.

Related Projects

Development of Ultra High Temperature Resistance Polymeric Nano Composite for Long Distance Space Applications
Development of Ultra High Temperature Resistance Polymeric Nano Composite for Long Distance Space Applications
Super Resolution of Mammograms for Breast Cancer Detection
Super Resolution of Mammograms for Breast Cancer Detection
Multi-User Detection in Sporadic 3GPP Massive M2M Communication via Compressed Sensing
Multi-User Detection in Sporadic 3GPP Massive M2M Communication via Compressed Sensing
ACIST : Amrita Content based Indexing and Searching Tool
ACIST : Amrita Content based Indexing and Searching Tool
Smart EV Sharing infrastructure with Solar Powered EV Battery Swapping/Charging Stations
Smart EV Sharing infrastructure with Solar Powered EV Battery Swapping/Charging Stations
Admissions Apply Now