
International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 2
March-April 2025
Indexing Partners



















Survey On Evasion Techniques: Dynamic Loading & Polymorphic Evasion In C2 Environment
Author(s) | Pratik. S. Yawale, Sushant D. Raut, Sushant S. Khond, Apeksha A. Kherde, Shravani S. Wankhade |
---|---|
Country | India |
Abstract | As cyber attackers increasingly rely on sophisticated techniques to maintain control over compromised systems, evasion methods such as dynamic loading and polymorphic evasion have become pivotal in thwarting modern security mechanisms. This survey paper explores the advanced tactics used in Command and Control (C2) environments, where attackers control compromised systems through hidden channels. Dynamic loading allows malicious code to be injected into memory at runtime, avoiding detection by traditional security tools that scan static code. In parallel, polymorphic evasion enables malware to continually alter its code signature, evading signature-based detection systems. This paper examines the functionality of these techniques, reviews case studies of their use in real-world C2 operations, and analyzes their impact on cybersecurity defenses. Additionally, we evaluate current detection mechanisms and discuss future research directions for developing robust countermeasures against these evolving threats. Understanding these evasion methods is critical for enhancing the detection and mitigation of advanced persistent threats (APTs) and improving the security of modern network environments. |
Field | Computer Applications |
Published In | Volume 7, Issue 1, January-February 2025 |
Published On | 2025-02-23 |
DOI | https://doi.org/10.36948/ijfmr.2025.v07i01.37602 |
Short DOI | https://doi.org/g854h2 |
Share this

E-ISSN 2582-2160

CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
