Skip to content

Latest commit

 

History

History
47 lines (40 loc) · 1.24 KB

data-flow-analysis-evasion.md

File metadata and controls

47 lines (40 loc) · 1.24 KB
ID B0045
Objective(s) Anti-Static Analysis
Related ATT&CK Techniques None
Anti-Analysis Type Evasion
Version 2.0
Created 26 June 2021
Last Modified 10 November 2022

Data Flow Analysis Evasion

Malware code evades data flow analysis (also known as information flow analysis and taint-tracking).

Methods

Name ID Description
Control Dependence B0045.001 Data is propagated via an if-then-else clause instead of direct assignment.[1]
Implicit Flows B0045.002 Data is propagated via semantic relationships, for example one variable not changing its state could imply the state of another variable.[1]
Arbitrary Memory Corruption B0045.003 Data is propagated by corrupting memory, for example overwriting a region of stack space where a file pointer is held.[1]

References

[1] http://www.seclab.cs.sunysb.edu/seclab/pubs/antitaint.pdf