Hunting for undetectable metamorphic viruses
نویسندگان
چکیده
منابع مشابه
Detecting Undetectable Metamorphic Viruses
Signature-based detection provides a relatively simple and efficient method for detecting known viruses. At present, most antivirus systems rely primarily on signature
متن کاملHunting for Pirated Software Using Metamorphic Analysis
Hunting for Pirated Software Using Metamorphic Analysis by Hardikkumar Rana In this paper, we consider the problem of detecting software that has been pirated and modified. We analyze a variety of detection techniques that have been previously studied in the context of malware detection. For each technique, we empirically determine the detection rate as a function of the degree of modification ...
متن کاملDetecting Undetectable Computer Viruses
Signature-based detection relies on patterns present in viruses and provides a relatively simple and efficient method for detecting known viruses. At present, most anti-virus systems rely primarily on signature detection. Metamorphic viruses are one of the most difficult types of viruses to detect. Such viruses change their internal structure, which provides an effective means of evading signat...
متن کاملPairwise Alignment of Metamorphic Computer Viruses
Computer viruses and other forms of malware pose a threat to virtually any software system. A computer virus is a piece of software which takes advantage of known weaknesses in a software system, and usually has the ability to deliver a malicious payload. A common technique that virus writers use to avoid detection is to enable the virus to change itself by having some kind of self-modifying co...
متن کاملAdvanced Metamorphic Techniques in Computer Viruses
Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses. However detection by emulation can defeat simple polymorphism: thus metamorphic techniques are used which thoroughly change the viral code, even after decryption. We briefly detail this evolution of virus protection techniques against detection and then study the METAPHOR...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal in Computer Virology
سال: 2010
ISSN: 1772-9890,1772-9904
DOI: 10.1007/s11416-010-0148-y