Detection of metamorphic and virtualization-based malware using algebraic specification
نویسندگان
چکیده
منابع مشابه
Metamorphic Malware Detection Using Code Metrics
Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opin...
متن کاملTransparent Detection of Computer Malware using Virtualization
In this paper, I explore malware detection using a combination of virtualizationand storage-based intrusion detection techniques. By monitoring disk activity of a virtual machine and correlating that activity to knowledge of the filesystem structure on the virtual machine’s disk, an intrusion detection system can react to file changes immediately. Such a system can use a traditional antivirus s...
متن کاملMetamorphic Malware Analysis and Detection Methods
Malware or malicious code is software causing some unwanted and unauthorized activities on the system in a stealthy manner without the knowledge of the user. Malware activation makes the system vulnerable to malicious activities of the attacker. Malware makes its way to the system because of the lack of security awareness amongst users. It spreads through network vulnerabilities such as email a...
متن کاملEnhancing the detection of metamorphic malware using call graphs
Malware stands for malicious software. It is software that is designed with a harmful intent. A malware detector is a system that attempts to identify malware using Application Programming Interface (API) call graph technique and/or other techniques. API call graph techniques follow two main steps, namely, transformation of malware samples into an API call graph using API call graph constructio...
متن کاملMetamorphic Malware Detection Using Function Call Graph Analysis
Previous work has shown that well-designed metamorphicmalware can evade many commonly-used malware detection techniques, including signature scanning. In this paper, we consider a previously developed score which is based on function call graph analysis. We test this score on challenging classes of metamorphic malware and we show that the resulting detection rates yield an improvement over othe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal in Computer Virology
سال: 2008
ISSN: 1772-9890,1772-9904
DOI: 10.1007/s11416-008-0094-0