Loading

Potentially Unwanted Program Analysis and Detection using YARA Rules
V.Shanmugavel1, S.Aanantha Sankar2, A.Pravin Kumar3, M.Satheeshkumar4, S.Malathi5

1V.Shanmugavel, Electronics and Communication Engineering, National Engineering College, Kovilpatti, Tamilnadu.
2S.AananthaSankar, Electronics and Communication Engineering, National Engineering College Kovilpatti, Tamilnadu.
3A.PravinKumar, Electronics and Communication Engineering, National Engineering College, Kovilpatti, Tamilnadu.
4M.Satheeshkumar, Electronics and Communication Engineering, National Engineering College, Kovilpatti, Tamilnadu.
5S.Malathi*, Electronics and Communication Engineering, National Engineering College, Kovilpatti, Tamilnadu.

Manuscript received on June 08, 2020. | Revised Manuscript received on June 25, 2020. | Manuscript published on June 30, 2020. | PP: 1331-1335 | Volume-9 Issue-5, June 2020. | Retrieval Number: E9855069520/2020©BEIESP | DOI: 10.35940/ijeat.E9855.069520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: : In this paper, some potentially unwanted program (PUP) samples are analyzed, detected and are blocked using YARA rules. Nowadays the user may notices the unwanted software such as PUP or a potentially unwanted application (PUA) . For security and parental control products subjective tagging criterion was used. To compromise privacy or weaken the computer’s security such software was implemented. Third party software often bundle a wanted program to be downloaded with a wrapper application and may offer to install an unwanted application. In this paper, some samples of PUP under reverse engineering technique are analyzed by using YARA rules that promptly resist unwanted applications or programs.
Keywords: PUP(Potentially unwanted software),YARA rule,PUA(Potentially unwanted application), Adware.